Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.143 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by attackers with Extended Read permission, or access to the Jenkins controller file system.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2022/11/15/4 | Mailing List Third Party Advisory |
https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2912 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
07 Jul 2023, 19:06
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-11-15 20:15
Updated : 2024-02-04 22:51
NVD link : CVE-2022-45392
Mitre link : CVE-2022-45392
CVE.ORG link : CVE-2022-45392
JSON object : View
Products Affected
jenkins
- ns-nd_integration_performance_publisher
CWE
CWE-522
Insufficiently Protected Credentials