Jenkins AppSpider Plugin 1.0.12 and earlier stores a password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2058 | Vendor Advisory | 
| https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2058 | Vendor Advisory | 
Configurations
                    History
                    21 Nov 2024, 05:25
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2058 - Vendor Advisory | 
25 Apr 2022, 17:42
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-522 | 
Information
                Published : 2020-11-04 15:15
Updated : 2024-11-21 05:25
NVD link : CVE-2020-2314
Mitre link : CVE-2020-2314
CVE.ORG link : CVE-2020-2314
JSON object : View
Products Affected
                jenkins
- appspider
CWE
                
                    
                        
                        CWE-522
                        
            Insufficiently Protected Credentials
