CVE-2020-2150 – org.jenkins-ci.plugins:sonar-quality-gates
Package
Manager: maven
Name: org.jenkins-ci.plugins:sonar-quality-gates
Vulnerable Version: >=0 <=1.3.1
Severity
Level: Low
CVSS v3.1: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00027 pctl0.05865
Details
Jenkins Sonar Quality Gates Plugin transmits credentials in plain text during configuration Sonar Quality Gates Plugin stores credentials in its global configuration file `org.quality.gates.jenkins.plugin.GlobalConfig.xml` on the Jenkins controller as part of its configuration. While the credentials are stored encrypted on disk, they are transmitted in plain text as part of the configuration form by Sonar Quality Gates Plugin 1.3.1 and earlier. This can result in exposure of the credential through browser extensions, cross-site scripting vulnerabilities, and similar situations.
Metadata
Created: 2022-05-24T17:10:28Z
Modified: 2023-01-06T16:56:35Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-6fh3-xhwg-7hfh/GHSA-6fh3-xhwg-7hfh.json
CWE IDs: ["CWE-319"]
Alternative ID: GHSA-6fh3-xhwg-7hfh
Finding: F017
Auto approve: 1