CVE-2020-2119 – org.jenkins-ci.plugins:azure-ad
Package
Manager: maven
Name: org.jenkins-ci.plugins:azure-ad
Vulnerable Version: >=0 <1.2.0
Severity
Level: Low
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00038 pctl0.10344
Details
Client secret transmitted in plain text by Azure AD Plugin Azure AD Plugin stores a client secret in its global configuration. While the credential is stored encrypted on disk, it is transmitted in plain text as part of the configuration form by Azure AD Plugin 1.1.2 and earlier. This can result in exposure of the credential through browser extensions, cross-site scripting vulnerabilities, and similar situations. Azure AD Plugin 1.2.0 transmits the client secret in its global configuration encrypted.
Metadata
Created: 2022-05-24T17:08:46Z
Modified: 2023-01-14T05:27:06Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-vvg2-hg3c-mqj3/GHSA-vvg2-hg3c-mqj3.json
CWE IDs: ["CWE-256", "CWE-522"]
Alternative ID: GHSA-vvg2-hg3c-mqj3
Finding: F085
Auto approve: 1