[JENKINS:SECURITY-1630] Credentials stored in plain text by `whitesource`

Severity Medium
Affected Packages 2
CVEs 1

whitesource 19.1.1 and earlier stores credentials in plain text as part of its global configuration file org.whitesource.jenkins.pipeline.WhiteSourcePipelineStep.xml and job config.xml files on the Jenkins controller.
These credentials could be viewed by users with Extended Read permission (in the case of job config.xml files) or access to the Jenkins controller file system.

As of publication of this advisory, there is no fix.

ID
JENKINS:SECURITY-1630
Severity
medium
Published
2020-07-02T00:00:00
(4 years ago)
Modified
2020-07-02T00:00:00
(4 years ago)
Rights
Jenkins Security Team
Other Advisories
Source # ID Name URL
Plugin repository whitesource repository https://github.com/jenkinsci/whitesource-plugin
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/org.jenkins-ci.plugins/whitesource org.jenkins-ci.plugins whitesource <= 19.1.1
Affected pkg:github/jenkinsci/whitesource-plugin jenkinsci whitesource-plugin <= 19.1.1
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...