Unencrypted Storage Vulnerability in Jenkins Consul KV Builder Plugin by Jenkins
CVE-2023-30530
4.3MEDIUM
Key Information:
- Vendor
Jenkins
- Vendor
- CVE Published:
- 12 April 2023
What is CVE-2023-30530?
The Jenkins Consul KV Builder Plugin versions 2.0.13 and earlier contain a serious vulnerability where the HashiCorp Consul ACL Token is stored unencrypted in the global configuration file on the Jenkins controller. This allows unauthorized users with file system access to view sensitive information, compromising the security integrity of the Jenkins environment. Proper security measures must be implemented to protect sensitive data and prevent unauthorized access.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Jenkins Consul KV Builder Plugin 0 <= 2.0.13
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved