Jenkins Build-Publisher plugin version 1.21 and earlier stores credentials to other Jenkins instances in the file hudson.plugins.build_publisher.BuildPublisher.xml in the Jenkins master home directory. These credentials were stored unencrypted, allowing anyone with local file system access to access them. Additionally, the credentials were also transmitted in plain text as part of the configuration form. This could result in exposure of the credentials through browser extensions, cross-site scripting vulnerabilities, and similar situations.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/101544 | Third Party Advisory VDB Entry |
https://jenkins.io/security/advisory/2017-10-23/ | Vendor Advisory |
http://www.securityfocus.com/bid/101544 | Third Party Advisory VDB Entry |
https://jenkins.io/security/advisory/2017-10-23/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 03:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/101544 - Third Party Advisory, VDB Entry | |
References | () https://jenkins.io/security/advisory/2017-10-23/ - Vendor Advisory |
Information
Published : 2018-01-26 02:29
Updated : 2024-11-21 03:04
NVD link : CVE-2017-1000387
Mitre link : CVE-2017-1000387
CVE.ORG link : CVE-2017-1000387
JSON object : View
Products Affected
jenkins
- build-publisher
CWE
CWE-522
Insufficiently Protected Credentials