CVE-2023-24450

Jenkins view-cloner Plugin 1.1 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:jenkins:view-cloner:1.0:*:*:*:*:jenkins:*:*
cpe:2.3:a:jenkins:view-cloner:1.1:*:*:*:*:jenkins:*:*

History

21 Nov 2024, 07:47

Type Values Removed Values Added
References () https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2787 - Vendor Advisory () https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2787 - Vendor Advisory
Summary
  • (es) El complemento view-cloner de Jenkins en su versión 1.1 y anteriores almacena contraseñas sin cifrar en archivos job config.xml en el controlador Jenkins, donde los usuarios con permiso de lectura extendida pueden verlas o acceder al sistema de archivos del controlador Jenkins.

Information

Published : 2023-01-26 21:18

Updated : 2024-11-21 07:47


NVD link : CVE-2023-24450

Mitre link : CVE-2023-24450

CVE.ORG link : CVE-2023-24450


JSON object : View

Products Affected

jenkins

  • view-cloner
CWE
CWE-312

Cleartext Storage of Sensitive Information