CVE-2020-2274

Jenkins ElasTest Plugin 1.2.1 and earlier stores its server password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jenkins:elastest:*:*:*:*:*:jenkins:*:*

History

21 Nov 2024, 05:25

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2020/09/16/3 - Third Party Advisory () http://www.openwall.com/lists/oss-security/2020/09/16/3 - Third Party Advisory
References () https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-2014 - Vendor Advisory () https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-2014 - Vendor Advisory

Information

Published : 2020-09-16 14:15

Updated : 2024-11-21 05:25


NVD link : CVE-2020-2274

Mitre link : CVE-2020-2274

CVE.ORG link : CVE-2020-2274


JSON object : View

Products Affected

jenkins

  • elastest
CWE
CWE-312

Cleartext Storage of Sensitive Information