logo

CVE-2023-24439 org.jenkins-ci.plugins:jira-steps

Package

Manager: maven
Name: org.jenkins-ci.plugins:jira-steps
Vulnerable Version: >=0 <=2.0.165.v8846cf59f3db

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00027 pctl0.05791

Details

Plaintext Storage of a Password in Jenkins JIRA Pipeline Steps Plugin Jenkins JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier stores the private keys unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.

Metadata

Created: 2023-01-26T21:30:18Z
Modified: 2023-02-06T16:39:45Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/01/GHSA-g29v-5pwh-wxx4/GHSA-g29v-5pwh-wxx4.json
CWE IDs: ["CWE-256", "CWE-312"]
Alternative ID: GHSA-g29v-5pwh-wxx4
Finding: F020
Auto approve: 1