logo

CVE-2020-2274 org.jenkins-ci.plugins:elastest

Package

Manager: maven
Name: org.jenkins-ci.plugins:elastest
Vulnerable Version: >=0 <=1.2.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.0001 pctl0.0084

Details

Passwords stored in plain text by ElasTest Plugin Jenkins ElasTest Plugin 1.2.1 and earlier stores its server password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.

Metadata

Created: 2022-05-24T17:28:27Z
Modified: 2023-10-27T13:44:42Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-p9rc-x48f-582x/GHSA-p9rc-x48f-582x.json
CWE IDs: ["CWE-312"]
Alternative ID: GHSA-p9rc-x48f-582x
Finding: F020
Auto approve: 1