CVE-2023-30524 – org.jenkins-ci.plugins:reportportal
Package
Manager: maven
Name: org.jenkins-ci.plugins:reportportal
Vulnerable Version: >=0 <=0.5
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.0007 pctl0.22051
Details
Jenkins Report Portal Plugin configuration form does not mask tokens Jenkins Report Portal Plugin 0.5 and earlier stores ReportPortal access tokens unencrypted in job `config.xml` files on the Jenkins controller as part of its configuration. These tokens can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system. Additionally, the configuration form does not mask these tokens, increasing the potential for attackers to observe and capture them.
Metadata
Created: 2023-04-12T18:30:36Z
Modified: 2023-04-21T17:53:58Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/04/GHSA-j55j-28wc-v338/GHSA-j55j-28wc-v338.json
CWE IDs: []
Alternative ID: GHSA-j55j-28wc-v338
Finding: F085
Auto approve: 1