The Deploy to container Plugin stored passwords unencrypted as part of its configuration. This allowed users with Jenkins master local file system access, or users with Extended Read access to the jobs it is used in, to retrieve those passwords. The Deploy to container Plugin now integrates with Credentials Plugin to store passwords securely, and automatically migrates existing passwords.
References
Link | Resource |
---|---|
https://jenkins.io/security/advisory/2017-08-07/ | Vendor Advisory |
https://jenkins.io/security/advisory/2017-08-07/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 03:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://jenkins.io/security/advisory/2017-08-07/ - Vendor Advisory |
Information
Published : 2017-10-05 01:29
Updated : 2024-11-21 03:04
NVD link : CVE-2017-1000113
Mitre link : CVE-2017-1000113
CVE.ORG link : CVE-2017-1000113
JSON object : View
Products Affected
jenkins
- deploy
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor