Description
Jenkins OpenId Connect Authentication Plugin 2.6 and earlier stores a password of a local user account used as an anti-lockout feature in a recoverable format, allowing attackers with access to the Jenkins controller file system to recover the plain text password of that account, likely gaining administrator access to Jenkins.
Published: 2023-12-13
Score: 6.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-6r5w-jjr5-qvgr Password stored in a recoverable format by Jenkins OpenId Connect Authentication Plugin
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2025-02-13T17:19:34.765Z

Reserved: 2023-12-13T13:06:36.477Z

Link: CVE-2023-50770

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-12-13T18:15:44.040

Modified: 2024-11-21T08:37:16.857

Link: CVE-2023-50770

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses