Jenkins 2.499 and earlier, LTS 2.492.1 and earlier does not redact encrypted values of secrets when accessing `config.xml` of views via REST API or CLI, allowing attackers with View/Read permission to view encrypted values of secrets.
References
Link | Resource |
---|---|
https://www.jenkins.io/security/advisory/2025-03-05/#SECURITY-3496 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
24 Jun 2025, 00:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.jenkins.io/security/advisory/2025-03-05/#SECURITY-3496 - Vendor Advisory | |
CPE | cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:* cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:* |
|
First Time |
Jenkins jenkins
Jenkins |
06 Mar 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CWE | CWE-312 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
05 Mar 2025, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-05 23:15
Updated : 2025-06-24 00:46
NVD link : CVE-2025-27623
Mitre link : CVE-2025-27623
CVE.ORG link : CVE-2025-27623
JSON object : View
Products Affected
jenkins
- jenkins
CWE
CWE-312
Cleartext Storage of Sensitive Information