Description
Jenkins Reverse Proxy Auth Plugin 1.7.3 and earlier stores the LDAP manager password unencrypted in the global config.xml file on the Jenkins controller where it can be viewed by attackers with access to the Jenkins controller file system.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7452 | Jenkins Reverse Proxy Auth Plugin 1.7.3 and earlier stores the LDAP manager password unencrypted in the global config.xml file on the Jenkins controller where it can be viewed by attackers with access to the Jenkins controller file system. |
Github GHSA |
GHSA-wcjj-qm5v-j4pc | Jenkins Reverse Proxy Auth Plugin vulnerable due to plaintext storage of passwords |
References
History
Wed, 30 Apr 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-04-30T17:42:25.446Z
Reserved: 2022-11-14T00:00:00.000Z
Link: CVE-2022-45384
Updated: 2024-08-03T14:09:56.960Z
Status : Modified
Published: 2022-11-15T20:15:11.817
Modified: 2025-04-30T18:15:35.713
Link: CVE-2022-45384
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA