Insecure Storage of Credentials in Jenkins RocketChat Notifier Plugin
CVE-2022-34802
4.3MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 30 June 2022
Summary
The Jenkins RocketChat Notifier Plugin prior to version 1.5.3 stores sensitive information, including login passwords and webhook tokens, in an unencrypted format within its global configuration file on the Jenkins controller. This poses a significant risk as the stored credentials can be easily accessed by users who have filesystem access to the Jenkins controller, potentially compromising the security of the system and the integrity of the communication with the RocketChat service.
Affected Version(s)
Jenkins RocketChat Notifier Plugin <= 1.5.2
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved