CVE-2023-50772
4.3MEDIUM
Key Information
- Vendor
- Jenkins
- Status
- Jenkins Dingding JSON Pusher Plugin
- Vendor
- CVE Published:
- 13 December 2023
Summary
Jenkins Dingding JSON Pusher Plugin 2.0 and earlier stores access tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
Affected Version(s)
Jenkins Dingding JSON Pusher Plugin <= 2.0
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability Reserved.
Vulnerability published.
Collectors
NVD DatabaseMitre Database