Description
An insufficiently protected credentials vulnerability exists in Jenkins Crowd 2 Integration Plugin 2.0.0 and earlier in CrowdSecurityRealm.java, CrowdConfigurationService.java that allows attackers with local file system access to obtain the credentials used to connect to Crowd 2.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-3572 | An insufficiently protected credentials vulnerability exists in Jenkins Crowd 2 Integration Plugin 2.0.0 and earlier in CrowdSecurityRealm.java, CrowdConfigurationService.java that allows attackers with local file system access to obtain the credentials used to connect to Crowd 2. |
Github GHSA |
GHSA-cg6q-gp23-vwx8 | Jenkins Crowd 2 Integration Plugin stored credentials in plain text |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T12:40:46.997Z
Reserved: 2019-01-09T00:00:00.000Z
Link: CVE-2018-1000423
No data.
Status : Modified
Published: 2019-01-09T23:29:02.887
Modified: 2024-11-21T03:40:02.663
Link: CVE-2018-1000423
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA