logo

CVE-2023-50776 com.cloudtp.jenkins:paaslane-estimate

Package

Manager: maven
Name: com.cloudtp.jenkins:paaslane-estimate
Vulnerable Version: >=0 <=1.0.4

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00025 pctl0.05198

Details

Tokens stored in plain text by PaaSLane Estimate Plugin Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier stores PaaSLane authentication tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.

Metadata

Created: 2023-12-13T18:31:04Z
Modified: 2023-12-18T21:40:27Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/12/GHSA-c2f6-rf2r-6j6f/GHSA-c2f6-rf2r-6j6f.json
CWE IDs: ["CWE-312"]
Alternative ID: GHSA-c2f6-rf2r-6j6f
Finding: F020
Auto approve: 1