logo

CVE-2022-27195 org.jenkins-ci.plugins:parameterized-trigger

Package

Manager: maven
Name: org.jenkins-ci.plugins:parameterized-trigger
Vulnerable Version: >=0 <2.43.1

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.01474 pctl0.80212

Details

Sensitive parameter values captured in build metadata files by Jenkins Parameterized Trigger Plugin Jenkins Parameterized Trigger Plugin 2.43 and earlier captures environment variables passed to builds triggered using Jenkins Parameterized Trigger Plugin, including password parameter values, in their `build.xml` files. These values are stored unencrypted and can be viewed by users with access to the Jenkins controller file system. Existing `build.xml` files are not automatically updated to remove captured environment variables. They need to be manually cleaned up. To help with this, the plugin will report environment variables stored in `build.xml` as unloadable data in the Old Data Monitor, that allows discarding this data. Build records are only loaded from disk when needed however, so some builds stored in Jenkins may not immediately appear there.

Metadata

Created: 2022-03-16T00:00:45Z
Modified: 2022-11-30T20:44:33Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/03/GHSA-5mpf-hw8f-86w9/GHSA-5mpf-hw8f-86w9.json
CWE IDs: ["CWE-532"]
Alternative ID: GHSA-5mpf-hw8f-86w9
Finding: F009
Auto approve: 1