[JENKINS:SECURITY-1432] `extensivetesting` stores credentials in plain text
Severity
Medium
Affected Packages
2
CVEs
1
extensivetesting
stores credentials unencrypted in job config.xml
files on the Jenkins controller.
These credentials can be viewed by users with Extended Read permission or access to the Jenkins controller file system.
As of publication of this advisory there is no fix.
Package | Affected Version |
---|---|
pkg:maven/org.jenkins-ci.plugins/extensivetesting | <= 1.4.4b |
pkg:github/jenkinsci/extensivetesting-plugin | <= 1.4.4b |
- ID
- JENKINS:SECURITY-1432
- Severity
- medium
- Published
-
2019-10-16T00:00:00
(5 years ago) - Modified
-
2019-10-16T00:00:00
(5 years ago) - Rights
- Jenkins Security Team
- Other Advisories
Source | # ID | Name | URL |
---|---|---|---|
Plugin repository | extensivetesting repository | https://github.com/jenkinsci/extensivetesting-plugin |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:maven/org.jenkins-ci.plugins/extensivetesting | org.jenkins-ci.plugins | extensivetesting | <= 1.4.4b | |||
Affected | pkg:github/jenkinsci/extensivetesting-plugin | jenkinsci | extensivetesting-plugin | <= 1.4.4b |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |