logo

CVE-2023-50772 com.zintow:dingding-json-pusher

Package

Manager: maven
Name: com.zintow:dingding-json-pusher
Vulnerable Version: >=0 <=2.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00024 pctl0.0481

Details

Tokens stored in plain text by Dingding JSON Pusher Plugin Jenkins Dingding JSON Pusher Plugin 2.0 and earlier stores access tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.

Metadata

Created: 2023-12-13T18:31:04Z
Modified: 2023-12-18T18:39:24Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/12/GHSA-wjr6-v4c7-8cv6/GHSA-wjr6-v4c7-8cv6.json
CWE IDs: ["CWE-312"]
Alternative ID: GHSA-wjr6-v4c7-8cv6
Finding: F020
Auto approve: 1