Unencrypted Password Storage in Jenkins Performance Publisher Plugin
CVE-2022-45392

6.5MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
15 November 2022

Summary

The NS-ND Integration Performance Publisher Plugin for Jenkins allows for unencrypted storage of passwords within job config.xml files on the Jenkins controller. This oversight makes sensitive credentials potentially visible to attackers who possess Extended Read permission or access to the underlying file system. This vulnerability underscores the importance of secure credential management in CI/CD pipelines.

Affected Version(s)

Jenkins NS-ND Integration Performance Publisher Plugin <= 4.8.0.143

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.