[JENKINS:SECURITY-947] `diawi-upload` stores credentials in plain text
Severity
Medium
Affected Packages
2
CVEs
1
diawi-upload
stores credentials unencrypted in job config.xml
files on the Jenkins controller.
These credentials can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
Package | Affected Version |
---|---|
pkg:maven/org.jenkins-ci.plugins/diawi-upload | <= 1.4 |
pkg:github/jenkinsci/diawi-upload-plugin | <= 1.4 |
- ID
- JENKINS:SECURITY-947
- Severity
- medium
- Published
-
2019-04-03T00:00:00
(5 years ago) - Modified
-
2019-04-03T00:00:00
(5 years ago) - Rights
- Jenkins Security Team
- Other Advisories
Source | # ID | Name | URL |
---|---|---|---|
Plugin repository | diawi-upload repository | https://github.com/jenkinsci/diawi-upload-plugin |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:maven/org.jenkins-ci.plugins/diawi-upload | org.jenkins-ci.plugins | diawi-upload | <= 1.4 | |||
Affected | pkg:github/jenkinsci/diawi-upload-plugin | jenkinsci | diawi-upload-plugin | <= 1.4 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |