Jenkins Dingding JSON Pusher Plugin 2.0 and earlier stores access tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-wjr6-v4c7-8cv6 Tokens stored in plain text by Dingding JSON Pusher Plugin
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 02 Dec 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2025-02-13T17:19:35.969Z

Reserved: 2023-12-13T13:06:36.477Z

Link: CVE-2023-50772

cve-icon Vulnrichment

Updated: 2024-08-02T22:23:42.989Z

cve-icon NVD

Status : Modified

Published: 2023-12-13T18:15:44.137

Modified: 2024-11-21T08:37:17.080

Link: CVE-2023-50772

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses