logo

CVE-2022-43426 io.jenkins.plugins:s3explorer

Package

Manager: maven
Name: io.jenkins.plugins:s3explorer
Vulnerable Version: >=0 <=1.0.8

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00193 pctl0.41415

Details

AWS secrets displayed without masking by Jenkins S3 Explorer Plugin S3 Explorer Plugin stores AWS_SECRET_ACCESS_KEY in its global configuration file `s3explorer.xml` on the Jenkins controller as part of its configuration. While this secret is stored encrypted on disk, in S3 Explorer Plugin 1.0.8 and earlier the global configuration form does not mask the AWS_SECRET_ACCESS_KEY form field, increasing the potential for attackers to observe and capture it.

Metadata

Created: 2022-10-19T19:00:18Z
Modified: 2022-12-16T19:53:45Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/10/GHSA-mf4p-wjrm-cmjp/GHSA-mf4p-wjrm-cmjp.json
CWE IDs: ["CWE-256", "CWE-549"]
Alternative ID: GHSA-mf4p-wjrm-cmjp
Finding: F014
Auto approve: 1