logo

CVE-2020-2150 org.jenkins-ci.plugins:sonar-quality-gates

Package

Manager: maven
Name: org.jenkins-ci.plugins:sonar-quality-gates
Vulnerable Version: >=0 <=1.3.1

Severity

Level: Low

CVSS v3.1: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00027 pctl0.05865

Details

Jenkins Sonar Quality Gates Plugin transmits credentials in plain text during configuration Sonar Quality Gates Plugin stores credentials in its global configuration file `org.quality.gates.jenkins.plugin.GlobalConfig.xml` on the Jenkins controller as part of its configuration. While the credentials are stored encrypted on disk, they are transmitted in plain text as part of the configuration form by Sonar Quality Gates Plugin 1.3.1 and earlier. This can result in exposure of the credential through browser extensions, cross-site scripting vulnerabilities, and similar situations.

Metadata

Created: 2022-05-24T17:10:28Z
Modified: 2023-01-06T16:56:35Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-6fh3-xhwg-7hfh/GHSA-6fh3-xhwg-7hfh.json
CWE IDs: ["CWE-319"]
Alternative ID: GHSA-6fh3-xhwg-7hfh
Finding: F017
Auto approve: 1