Unsecured Password Storage in Jenkins Convertigo Mobile Platform Plugin
CVE-2022-34199
6.5MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 23 June 2022
Summary
The Convertigo Mobile Platform Plugin for Jenkins stores passwords in an unencrypted format within the job config.xml files on the Jenkins controller. This poses a risk as users with Extended Read permissions or direct access to the Jenkins controller's file system can easily view these sensitive passwords. It is crucial for users of this plugin to assess their security posture and consider implementing additional safeguards to protect sensitive information.
Affected Version(s)
Jenkins Convertigo Mobile Platform Plugin <= 1.1
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved