logo

CVE-2023-24450 org.jenkins-ci.plugins:view-cloner

Package

Manager: maven
Name: org.jenkins-ci.plugins:view-cloner
Vulnerable Version: >=0 <=1.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00072 pctl0.22628

Details

Passwords stored in plain text by Jenkins view-cloner Plugin Jenkins view-cloner Plugin 1.1 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.

Metadata

Created: 2023-01-26T21:30:18Z
Modified: 2023-02-02T17:31:58Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/01/GHSA-6hw7-x86v-wrgf/GHSA-6hw7-x86v-wrgf.json
CWE IDs: ["CWE-256", "CWE-312"]
Alternative ID: GHSA-6hw7-x86v-wrgf
Finding: F020
Auto approve: 1