[JENKINS:SECURITY-1551] `codescan` stores credentials in plain text
Severity
Low
Affected Packages
2
CVEs
1
codescan
stores an API key unencrypted in its global configuration file com.villagechief.codescan.jenkins.CodeScanBuilder.xml
on the Jenkins controller.
This API key can be viewed by users with access to the Jenkins controller file system.
As of publication of this advisory, there is no fix.
Package | Affected Version |
---|---|
pkg:maven/org.jenkins-ci.plugins/codescan | <= 0.11 |
pkg:github/jenkinsci/codescan-plugin | <= 0.11 |
- ID
- JENKINS:SECURITY-1551
- Severity
- low
- Published
-
2019-09-25T00:00:00
(5 years ago) - Modified
-
2019-09-25T00:00:00
(5 years ago) - Rights
- Jenkins Security Team
- Other Advisories
Source | # ID | Name | URL |
---|---|---|---|
Plugin repository | codescan repository | https://github.com/jenkinsci/codescan-plugin |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:maven/org.jenkins-ci.plugins/codescan | org.jenkins-ci.plugins | codescan | <= 0.11 | |||
Affected | pkg:github/jenkinsci/codescan-plugin | jenkinsci | codescan-plugin | <= 0.11 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |