Insecure Password Storage in Jenkins Squash TM Publisher Plugin
CVE-2022-34213

6.5MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
23 June 2022

Summary

The Jenkins Squash TM Publisher plugin stores sensitive information, specifically passwords, in an unencrypted format within its global configuration file on the Jenkins controller. This security flaw allows any user with access to the Jenkins controller's file system to view these passwords, potentially leading to unauthorized access and compromise of sensitive data. Immediate measures should be implemented to mitigate the risks associated with unprotected credential storage.

Affected Version(s)

Jenkins Squash TM Publisher (Squash4Jenkins) Plugin <= 1.0.0

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.