logo

CVE-2023-30523 org.jenkins-ci.plugins:reportportal

Package

Manager: maven
Name: org.jenkins-ci.plugins:reportportal
Vulnerable Version: >=0 <=0.5

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00032 pctl0.07669

Details

Jenkins Report Portal Plugin allows users with Item/Extended Read permission to view tokens on Jenkins controller Jenkins Report Portal Plugin 0.5 and earlier stores ReportPortal access tokens unencrypted in job `config.xml` files on the Jenkins controller as part of its configuration. These tokens can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system. Additionally, the configuration form does not mask these tokens, increasing the potential for attackers to observe and capture them.

Metadata

Created: 2023-04-12T18:30:36Z
Modified: 2023-04-12T22:18:27Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/04/GHSA-qgw9-vgrf-h723/GHSA-qgw9-vgrf-h723.json
CWE IDs: ["CWE-312"]
Alternative ID: GHSA-qgw9-vgrf-h723
Finding: F020
Auto approve: 1