Jenkins Email Extension Plugin 2.72 and 2.73 transmits and displays the SMTP password in plain text as part of the global Jenkins configuration form, potentially resulting in its exposure.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2020/08/12/4 | Mailing List Third Party Advisory |
https://jenkins.io/security/advisory/2020-08-12/#SECURITY-1975 | Vendor Advisory |
http://www.openwall.com/lists/oss-security/2020/08/12/4 | Mailing List Third Party Advisory |
https://jenkins.io/security/advisory/2020-08-12/#SECURITY-1975 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:25
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2020/08/12/4 - Mailing List, Third Party Advisory | |
References | () https://jenkins.io/security/advisory/2020-08-12/#SECURITY-1975 - Vendor Advisory |
Information
Published : 2020-08-12 14:15
Updated : 2024-11-21 05:25
NVD link : CVE-2020-2232
Mitre link : CVE-2020-2232
CVE.ORG link : CVE-2020-2232
JSON object : View
Products Affected
jenkins
- email_extension
CWE
CWE-319
Cleartext Transmission of Sensitive Information