logo

CVE-2022-27217 com.vmware.vcac:vmware-vrealize-codestream

Package

Manager: maven
Name: com.vmware.vcac:vmware-vrealize-codestream
Vulnerable Version: >=0 <=1.2

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00547 pctl0.66869

Details

Passwords stored in plain text by Jenkins Vmware vRealize CodeStream Plugin Jenkins Vmware vRealize CodeStream Plugin 1.2 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.

Metadata

Created: 2022-03-16T00:00:43Z
Modified: 2022-11-30T18:53:13Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/03/GHSA-9wvr-x83m-84v4/GHSA-9wvr-x83m-84v4.json
CWE IDs: ["CWE-522"]
Alternative ID: GHSA-9wvr-x83m-84v4
Finding: F035
Auto approve: 1