CVE-2022-46685 – org.jenkins-ci.plugins:gitea
Package
Manager: maven
Name: org.jenkins-ci.plugins:gitea
Vulnerable Version: >=0 <1.4.5
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00134 pctl0.33813
Details
Jenkins Gitea Plugin vulnerable to Cleartext Transmission of Sensitive Information In Jenkins Gitea Plugin 1.4.4 and earlier, the implementation of Gitea personal access tokens did not support credentials masking, potentially exposing them through the build log. Gitea Plugin 1.4.5 adds support for masking of Gitea personal access tokens. Administrators unable to update are advised to use SSH checkout instead.
Metadata
Created: 2022-12-12T09:30:35Z
Modified: 2022-12-12T22:18:16Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/12/GHSA-x3qh-53qf-jxq9/GHSA-x3qh-53qf-jxq9.json
CWE IDs: ["CWE-319"]
Alternative ID: GHSA-x3qh-53qf-jxq9
Finding: F017
Auto approve: 1