Insecure Storage of Authentication Tokens in Jenkins PaaSLane Estimate Plugin by Jenkins
CVE-2023-50776
4.3MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 13 December 2023
Summary
The Jenkins PaaSLane Estimate Plugin prior to version 1.0.4 insecurely stores authentication tokens in plain text within the job config.xml files on the Jenkins controller. This misconfiguration allows users with Item/Extended Read permissions or those with file system access to potentially expose sensitive authentication tokens. Users are recommended to upgrade to the latest version to mitigate the risk associated with this vulnerability.
Affected Version(s)
Jenkins PaaSLane Estimate Plugin 0 <= 1.0.4
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved