CVE-2023-50776 – com.cloudtp.jenkins:paaslane-estimate
Package
Manager: maven
Name: com.cloudtp.jenkins:paaslane-estimate
Vulnerable Version: >=0 <=1.0.4
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00025 pctl0.05198
Details
Tokens stored in plain text by PaaSLane Estimate Plugin Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier stores PaaSLane authentication tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
Metadata
Created: 2023-12-13T18:31:04Z
Modified: 2023-12-18T21:40:27Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/12/GHSA-c2f6-rf2r-6j6f/GHSA-c2f6-rf2r-6j6f.json
CWE IDs: ["CWE-312"]
Alternative ID: GHSA-c2f6-rf2r-6j6f
Finding: F020
Auto approve: 1