Credentials Exposure in Jenkins Config File Provider Plugin
CVE-2023-40339
7.5HIGH
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 16 August 2023
Summary
The Jenkins Config File Provider Plugin version 952.va_544a_6234b_46 and earlier lacks adequate credential management, allowing sensitive information to be written to build logs without being masked. This oversight means that credentials specified in configuration files are visible in the logs, posing a potential security risk to users' sensitive data. Users are strongly advised to upgrade to a patched version to mitigate this vulnerability.
Affected Version(s)
Jenkins Config File Provider Plugin 953.v0432a_802e4d2
Jenkins Config File Provider Plugin 953.v0432a_802e4d2
Jenkins Config File Provider Plugin 951.953.vdfc5f6e2dcc4
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved