logo

CVE-2022-45384 org.jenkins-ci.main:reverse-proxy-auth-plugin

Package

Manager: maven
Name: org.jenkins-ci.main:reverse-proxy-auth-plugin
Vulnerable Version: >=1.7.3 <1.7.4

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.0008 pctl0.2453

Details

Jenkins Reverse Proxy Auth Plugin vulnerable due to plaintext storage of passwords Jenkins Reverse Proxy Auth Plugin versions 1.7.3 and earlier stores the LDAP manager password unencrypted in the global config.xml file on the Jenkins controller where it can be viewed by attackers with access to the Jenkins controller file system.

Metadata

Created: 2022-11-16T12:00:23Z
Modified: 2025-04-30T20:25:23Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/11/GHSA-wcjj-qm5v-j4pc/GHSA-wcjj-qm5v-j4pc.json
CWE IDs: ["CWE-256", "CWE-522"]
Alternative ID: GHSA-wcjj-qm5v-j4pc
Finding: F085
Auto approve: 1