A vulnerability in Jenkins ECS Publisher Plugin 1.0.0 and earlier allows attackers with Item/Extended Read permission, or local file system access to the Jenkins home directory to obtain the API token configured in this plugin's configuration.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-3762 | A vulnerability in Jenkins ECS Publisher Plugin 1.0.0 and earlier allows attackers with Item/Extended Read permission, or local file system access to the Jenkins home directory to obtain the API token configured in this plugin's configuration. |
Github GHSA |
GHSA-ffj8-w4rj-vr7v | ECS Publisher Plugin stored and displayed API token in plain text |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-05T03:07:16.801Z
Reserved: 2019-03-28T00:00:00.000Z
Link: CVE-2019-1003045
No data.
Status : Modified
Published: 2019-03-28T18:29:00.453
Modified: 2024-11-21T04:17:48.147
Link: CVE-2019-1003045
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA