Insecure Token Storage in Jenkins Build Notifications Plugin by Jenkins
CVE-2022-34800

4.3MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
30 June 2022

Summary

The Jenkins Build Notifications Plugin stores sensitive tokens in an unencrypted format within its global configuration files on the Jenkins controller. This vulnerability allows users with file system access to the Jenkins controller to potentially view these tokens, which may lead to unauthorized actions or information disclosure. Proper security measures should be implemented to safeguard sensitive configuration data from unauthorized access.

Affected Version(s)

Jenkins Build Notifications Plugin <= 1.5.0

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.