CVE-2022-27217 – com.vmware.vcac:vmware-vrealize-codestream
Package
Manager: maven
Name: com.vmware.vcac:vmware-vrealize-codestream
Vulnerable Version: >=0 <=1.2
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00547 pctl0.66869
Details
Passwords stored in plain text by Jenkins Vmware vRealize CodeStream Plugin Jenkins Vmware vRealize CodeStream Plugin 1.2 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
Metadata
Created: 2022-03-16T00:00:43Z
Modified: 2022-11-30T18:53:13Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/03/GHSA-9wvr-x83m-84v4/GHSA-9wvr-x83m-84v4.json
CWE IDs: ["CWE-522"]
Alternative ID: GHSA-9wvr-x83m-84v4
Finding: F035
Auto approve: 1