Description
Jenkins Build-Publisher plugin version 1.21 and earlier stores credentials to other Jenkins instances in the file hudson.plugins.build_publisher.BuildPublisher.xml in the Jenkins master home directory. These credentials were stored unencrypted, allowing anyone with local file system access to access them. Additionally, the credentials were also transmitted in plain text as part of the configuration form. This could result in exposure of the credentials through browser extensions, cross-site scripting vulnerabilities, and similar situations.
Published: 2018-01-26
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-4482 Jenkins Build-Publisher plugin version 1.21 and earlier stores credentials to other Jenkins instances in the file hudson.plugins.build_publisher.BuildPublisher.xml in the Jenkins master home directory. These credentials were stored unencrypted, allowing anyone with local file system access to access them. Additionally, the credentials were also transmitted in plain text as part of the configuration form. This could result in exposure of the credentials through browser extensions, cross-site scripting vulnerabilities, and similar situations.
Github GHSA Github GHSA GHSA-m3wv-fr8v-fmh7 Jenkins Build-Publisher plugin has Insufficiently Protected Credentials
History

No history.

Subscriptions

Jenkins Build-publisher
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T22:00:41.187Z

Reserved: 2017-11-29T00:00:00.000Z

Link: CVE-2017-1000387

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-01-26T02:29:00.330

Modified: 2024-11-21T03:04:36.817

Link: CVE-2017-1000387

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses