Description
Jenkins Applatix Plugin 1.1 and earlier stores a password unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system.
Published: 2020-02-12
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-2495 Jenkins Applatix Plugin 1.1 and earlier stores a password unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system.
Github GHSA Github GHSA GHSA-54m9-h7qp-fwvg Password stored in plain text by Applatix Plugin
History

No history.

Subscriptions

Jenkins Applatix
cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2024-08-04T07:01:40.751Z

Reserved: 2019-12-05T00:00:00.000Z

Link: CVE-2020-2133

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-02-12T15:15:14.633

Modified: 2024-11-21T05:24:44.910

Link: CVE-2020-2133

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses