logo

CVE-2017-1000387 org.jenkins-ci.plugins:build-publisher

Package

Manager: maven
Name: org.jenkins-ci.plugins:build-publisher
Vulnerable Version: >=0 <1.22

Severity

Level: High

CVSS v3.1: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00013 pctl0.0152

Details

Jenkins Build-Publisher plugin has Insufficiently Protected Credentials Jenkins Build-Publisher plugin version 1.21 and earlier stores credentials to other Jenkins instances in the file `hudson.plugins.build_publisher.BuildPublisher.xml` in the Jenkins master home directory. These credentials were stored unencrypted, allowing anyone with local file system access to access them. Additionally, the credentials were also transmitted in plain text as part of the configuration form. This could result in exposure of the credentials through browser extensions, cross-site scripting vulnerabilities, and similar situations. Build-Publisher Plugin 1.22 encrypts the credentials on disk, and only transmits their encrypted form to users viewing the configuration form.

Metadata

Created: 2022-05-13T01:41:14Z
Modified: 2022-12-06T21:55:17Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-m3wv-fr8v-fmh7/GHSA-m3wv-fr8v-fmh7.json
CWE IDs: ["CWE-522"]
Alternative ID: GHSA-m3wv-fr8v-fmh7
Finding: F035
Auto approve: 1