[JENKINS:SECURITY-1432] `extensivetesting` stores credentials in plain text

Severity Medium
Affected Packages 2
CVEs 1

extensivetesting stores credentials unencrypted in job config.xml files on the Jenkins controller.
These credentials can be viewed by users with Extended Read permission or access to the Jenkins controller file system.

As of publication of this advisory there is no fix.

ID
JENKINS:SECURITY-1432
Severity
medium
Published
2019-10-16T00:00:00
(5 years ago)
Modified
2019-10-16T00:00:00
(5 years ago)
Rights
Jenkins Security Team
Other Advisories
Source # ID Name URL
Plugin repository extensivetesting repository https://github.com/jenkinsci/extensivetesting-plugin
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/org.jenkins-ci.plugins/extensivetesting org.jenkins-ci.plugins extensivetesting <= 1.4.4b
Affected pkg:github/jenkinsci/extensivetesting-plugin jenkinsci extensivetesting-plugin <= 1.4.4b
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...