logo

CVE-2023-25721 com.veracode.jenkins:veracode-scan

Package

Manager: maven
Name: com.veracode.jenkins:veracode-scan
Vulnerable Version: >=0 <23.3.19.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00215 pctl0.44084

Details

Veracode Scan Jenkins Plugin vulnerable to information disclosure Veracode Scan Jenkins Plugin before 23.3.19.0 is vulnerable to information disclosure of proxy credentials in job logs under specific configurations. Users are potentially affected if they: - are using Veracode Scan Jenkins Plugin prior to 23.3.19.0 - AND have configured Veracode Scan to run on remote agent jobs - AND have enabled the "Connect using proxy" option - AND have configured the proxy settings with proxy credentials - AND a Jenkins admin has enabled debug in global system settings. By default, even in this configuration only the job owner or Jenkins admin can view the job log.

Metadata

Created: 2023-03-28T21:30:20Z
Modified: 2023-04-05T19:40:36Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/03/GHSA-c4jr-vjm4-27hq/GHSA-c4jr-vjm4-27hq.json
CWE IDs: ["CWE-532"]
Alternative ID: GHSA-c4jr-vjm4-27hq
Finding: F009
Auto approve: 1