CVE-2023-24450
Published Jan 26, 2023
Last updated 2 years ago
Overview
- Description
- Jenkins view-cloner Plugin 1.1 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
- Source
- jenkinsci-cert@googlegroups.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 6.5
- Impact score
- 3.6
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
Weaknesses
- nvd@nist.gov
- CWE-312
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:jenkins:view-cloner:1.0:*:*:*:*:jenkins:*:*", "vulnerable": true, "matchCriteriaId": "672D351E-9D89-4891-9154-06449A73F135" }, { "criteria": "cpe:2.3:a:jenkins:view-cloner:1.1:*:*:*:*:jenkins:*:*", "vulnerable": true, "matchCriteriaId": "964664A9-C3A1-45B1-93A1-8A07C43BD484" } ], "operator": "OR" } ] } ]