CVE-2020-2239 – org.jenkins-ci.plugins:parameterized-remote-trigger
Package
Manager: maven
Name: org.jenkins-ci.plugins:parameterized-remote-trigger
Vulnerable Version: >=0 <3.1.4
Severity
Level: Low
CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00048 pctl0.14249
Details
Secret stored in plain text by Jenkins Parameterized Remote Trigger Plugin Parameterized Remote Trigger Plugin 3.1.3 and earlier stores a secret unencrypted in its global configuration file `org.jenkinsci.plugins.ParameterizedRemoteTrigger.RemoteBuildConfiguration.xml` on the Jenkins controller as part of its configuration. This secret can be viewed by attackers with access to the Jenkins controller file system. Parameterized Remote Trigger Plugin 3.1.4 stores the secret encrypted once its configuration is saved again.
Metadata
Created: 2022-05-24T17:27:06Z
Modified: 2022-12-21T00:21:31Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-wphq-j78p-fhgp/GHSA-wphq-j78p-fhgp.json
CWE IDs: ["CWE-256", "CWE-311"]
Alternative ID: GHSA-wphq-j78p-fhgp
Finding: F020
Auto approve: 1