logo

CVE-2019-10415 org.jenkins-ci.plugins:violation-comments-to-gitlab

Package

Manager: maven
Name: org.jenkins-ci.plugins:violation-comments-to-gitlab
Vulnerable Version: >=0 <2.29

Severity

Level: Medium

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00065 pctl0.20575

Details

Jenkins Violation Comments to GitLab Plugin has Insufficiently Protected Credentials Violation Comments to GitLab Plugin stored API tokens unencrypted in job `config.xml` files and its global configuration file `org.jenkinsci.plugins.jvctgl.ViolationsToGitLabGlobalConfiguration.xml` on the Jenkins controller. These credentials could be viewed by users with Extended Read permission, or access to the Jenkins controller file system. Violation Comments to GitLab Plugin now stores these credentials encrypted. Existing jobs need to have their configuration saved for existing plain text credentials to be overwritten.

Metadata

Created: 2022-05-24T16:56:46Z
Modified: 2023-02-23T20:32:28Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-8hwr-589g-xpj2/GHSA-8hwr-589g-xpj2.json
CWE IDs: ["CWE-522"]
Alternative ID: GHSA-8hwr-589g-xpj2
Finding: F035
Auto approve: 1