Insufficient Credential Masking in Jenkins Azure Key Vault Plugin
CVE-2023-30514
7.5HIGH
Summary
The Azure Key Vault Plugin for Jenkins presents a security challenge due to its inadequate masking of sensitive credentials within the build log. When the push mode for durable task logging is activated, the plugin fails to conceal credentials effectively, leaving them exposed in logs. This oversight can lead to unauthorized access and data leakage, posing a risk to organizations relying on this integration for secure key management.
Affected Version(s)
Jenkins Azure Key Vault Plugin 0 <= 187.va_cd5fecd198a_
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved