Jenkins Build-Publisher plugin version 1.21 and earlier stores credentials to other Jenkins instances in the file hudson.plugins.build_publisher.BuildPublisher.xml in the Jenkins master home directory. These credentials were stored unencrypted, allowing anyone with local file system access to access them. Additionally, the credentials were also transmitted in plain text as part of the configuration form. This could result in exposure of the credentials through browser extensions, cross-site scripting vulnerabilities, and similar situations.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-4482 Jenkins Build-Publisher plugin version 1.21 and earlier stores credentials to other Jenkins instances in the file hudson.plugins.build_publisher.BuildPublisher.xml in the Jenkins master home directory. These credentials were stored unencrypted, allowing anyone with local file system access to access them. Additionally, the credentials were also transmitted in plain text as part of the configuration form. This could result in exposure of the credentials through browser extensions, cross-site scripting vulnerabilities, and similar situations.
Github GHSA Github GHSA GHSA-m3wv-fr8v-fmh7 Jenkins Build-Publisher plugin has Insufficiently Protected Credentials
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T22:00:41.187Z

Reserved: 2017-11-29T00:00:00

Link: CVE-2017-1000387

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-01-26T02:29:00.330

Modified: 2024-11-21T03:04:36.817

Link: CVE-2017-1000387

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.