Credentials Exposure in Jenkins Config File Provider Plugin
CVE-2023-40339

7.5HIGH

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
16 August 2023

Summary

The Jenkins Config File Provider Plugin version 952.va_544a_6234b_46 and earlier lacks adequate credential management, allowing sensitive information to be written to build logs without being masked. This oversight means that credentials specified in configuration files are visible in the logs, posing a potential security risk to users' sensitive data. Users are strongly advised to upgrade to a patched version to mitigate this vulnerability.

Affected Version(s)

Jenkins Config File Provider Plugin 953.v0432a_802e4d2

Jenkins Config File Provider Plugin 953.v0432a_802e4d2

Jenkins Config File Provider Plugin 951.953.vdfc5f6e2dcc4

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.