Unencrypted Key Storage in Jenkins JIRA Pipeline Steps Plugin by Jenkins
CVE-2023-24439

5.5MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
26 January 2023

Summary

The JIRA Pipeline Steps Plugin for Jenkins inadvertently stores sensitive private keys in an unencrypted format within its global configuration file. This poses a significant risk, as any user with access to the Jenkins controller's file system can easily view these unprotected keys. Organizations utilizing this plugin should take immediate action to secure sensitive credentials and update to the latest version to mitigate potential threats.

Affected Version(s)

Jenkins JIRA Pipeline Steps Plugin <= 2.0.165.v8846cf59f3db

References

CVSS V3.1

Score:
5.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.