logo

CVE-2020-2114 org.jenkins-ci.plugins:s3

Package

Manager: maven
Name: org.jenkins-ci.plugins:s3
Vulnerable Version: >=0 <0.11.5

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00053 pctl0.16201

Details

Jenkins S3 Publisher Plugin transmits credentials in plain text during configuration S3 Publisher Plugin stores a secret key in its global configuration. While the credential is stored encrypted on disk, it is transmitted in plain text as part of the configuration form by S3 publisher Plugin 0.11.4 and earlier. This can result in exposure of the credential through browser extensions, cross-site scripting vulnerabilities, and similar situations. S3 Publisher Plugin 0.11.5 transmits the secret key in its global configuration encrypted.

Metadata

Created: 2022-05-24T17:08:46Z
Modified: 2023-01-06T17:07:28Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-ffr6-8cv5-j637/GHSA-ffr6-8cv5-j637.json
CWE IDs: ["CWE-319", "CWE-522"]
Alternative ID: GHSA-ffr6-8cv5-j637
Finding: F017
Auto approve: 1