CVE-2022-36901

Jenkins HTTP Request Plugin 1.15 and earlier stores HTTP Request passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jenkins:http_request:*:*:*:*:*:jenkins:*:*

History

21 Nov 2024, 07:14

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2022/07/27/1 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2022/07/27/1 - Mailing List, Third Party Advisory
References () https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2053 - Vendor Advisory () https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2053 - Vendor Advisory

02 Nov 2023, 21:06

Type Values Removed Values Added
CWE CWE-668 CWE-522

Information

Published : 2022-07-27 15:15

Updated : 2024-11-21 07:14


NVD link : CVE-2022-36901

Mitre link : CVE-2022-36901

CVE.ORG link : CVE-2022-36901


JSON object : View

Products Affected

jenkins

  • http_request
CWE
CWE-522

Insufficiently Protected Credentials