[JENKINS:SECURITY-1630] Credentials stored in plain text by `whitesource`
Severity
Medium
Affected Packages
2
CVEs
1
whitesource
19.1.1 and earlier stores credentials in plain text as part of its global configuration file org.whitesource.jenkins.pipeline.WhiteSourcePipelineStep.xml
and job config.xml
files on the Jenkins controller.
These credentials could be viewed by users with Extended Read permission (in the case of job config.xml
files) or access to the Jenkins controller file system.
As of publication of this advisory, there is no fix.
Package | Affected Version |
---|---|
pkg:maven/org.jenkins-ci.plugins/whitesource | <= 19.1.1 |
pkg:github/jenkinsci/whitesource-plugin | <= 19.1.1 |
- ID
- JENKINS:SECURITY-1630
- Severity
- medium
- Published
-
2020-07-02T00:00:00
(4 years ago) - Modified
-
2020-07-02T00:00:00
(4 years ago) - Rights
- Jenkins Security Team
- Other Advisories
Source | # ID | Name | URL |
---|---|---|---|
Plugin repository | whitesource repository | https://github.com/jenkinsci/whitesource-plugin |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:maven/org.jenkins-ci.plugins/whitesource | org.jenkins-ci.plugins | whitesource | <= 19.1.1 | |||
Affected | pkg:github/jenkinsci/whitesource-plugin | jenkinsci | whitesource-plugin | <= 19.1.1 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |