Unencrypted API Token Exposure in Jenkins CONS3RT Plugin by CloudBees
CVE-2022-41255
6.5MEDIUM
What is CVE-2022-41255?
The Jenkins CONS3RT Plugin prior to version 1.0.0 has a significant security flaw where it stores the Cons3rt API token in unencrypted form within the job config.xml files located on the Jenkins controller. This exposure can potentially allow unauthorized users with access to the Jenkins controller's file system to read sensitive credentials, leading to further exploitation of the Jenkins environment.
Affected Version(s)
Jenkins CONS3RT Plugin <= 1.0.0