CVE-2023-24454 – org.jenkins-ci.plugins:testquality-updater
Package
Manager: maven
Name: org.jenkins-ci.plugins:testquality-updater
Vulnerable Version: >=0 <=1.3
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00027 pctl0.05824
Details
Plaintext Storage of a Password in Jenkins TestQuality Updater Plugin Jenkins TestQuality Updater Plugin 1.3 and earlier stores the TestQuality Updater password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
Metadata
Created: 2023-01-26T21:30:18Z
Modified: 2023-02-03T20:35:16Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/01/GHSA-98qc-v8vg-mcx4/GHSA-98qc-v8vg-mcx4.json
CWE IDs: ["CWE-256", "CWE-312"]
Alternative ID: GHSA-98qc-v8vg-mcx4
Finding: F020
Auto approve: 1