CVE-2023-30523
Published Apr 12, 2023
Last updated 2 years ago
Overview
- Description
- Jenkins Report Portal Plugin 0.5 and earlier stores ReportPortal access tokens unencrypted in job config.xml files on the Jenkins controller as part of its configuration where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
- Source
- jenkinsci-cert@googlegroups.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 4.3
- Impact score
- 1.4
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
- Severity
- MEDIUM
Weaknesses
- nvd@nist.gov
- CWE-312
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:jenkins:report_portal:*:*:*:*:*:jenkins:*:*", "vulnerable": true, "matchCriteriaId": "85C7C386-F579-4E25-BB3E-909BE009EAFD", "versionEndIncluding": "0.5" } ], "operator": "OR" } ] } ]