First published: Wed Nov 20 2013(Updated: )
Kohsuke Kawaguchi reports: Insecure storage of passwords in Subversion plugin. Description Just noticed, that ssh-key passphrases in <JOB>/subversion.credentials are only coded in base64 an can easily be decoded. maybe this is fixed already. My setup is old and grown over time. Although i am running 1.500 the config-files may be old. i did run the "re-keying" process, as jenkins told me to do. Nevertheless, passphrases are still stored in base64 This was originally reported by Lennart Starr
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Subversion Plugin | <=1.53 | |
Jenkins Subversion Plugin | =1.0 | |
Jenkins Subversion Plugin | =1.1 | |
Jenkins Subversion Plugin | =1.2 | |
Jenkins Subversion Plugin | =1.3 | |
Jenkins Subversion Plugin | =1.4 | |
Jenkins Subversion Plugin | =1.5 | |
Jenkins Subversion Plugin | =1.6 | |
Jenkins Subversion Plugin | =1.7 | |
Jenkins Subversion Plugin | =1.8 | |
Jenkins Subversion Plugin | =1.9 | |
Jenkins Subversion Plugin | =1.10 | |
Jenkins Subversion Plugin | =1.11 | |
Jenkins Subversion Plugin | =1.12 | |
Jenkins Subversion Plugin | =1.13 | |
Jenkins Subversion Plugin | =1.14 | |
Jenkins Subversion Plugin | =1.15 | |
Jenkins Subversion Plugin | =1.16 | |
Jenkins Subversion Plugin | =1.17 | |
Jenkins Subversion Plugin | =1.18 | |
Jenkins Subversion Plugin | =1.19 | |
Jenkins Subversion Plugin | =1.20 | |
Jenkins Subversion Plugin | =1.21 | |
Jenkins Subversion Plugin | =1.22 | |
Jenkins Subversion Plugin | =1.23 | |
Jenkins Subversion Plugin | =1.24 | |
Jenkins Subversion Plugin | =1.25 | |
Jenkins Subversion Plugin | =1.26 | |
Jenkins Subversion Plugin | =1.27 | |
Jenkins Subversion Plugin | =1.28 | |
Jenkins Subversion Plugin | =1.29 | |
Jenkins Subversion Plugin | =1.30 | |
Jenkins Subversion Plugin | =1.31 | |
Jenkins Subversion Plugin | =1.32 | |
Jenkins Subversion Plugin | =1.33 | |
Jenkins Subversion Plugin | =1.34 | |
Jenkins Subversion Plugin | =1.35 | |
Jenkins Subversion Plugin | =1.36 | |
Jenkins Subversion Plugin | =1.37 | |
Jenkins Subversion Plugin | =1.38 | |
Jenkins Subversion Plugin | =1.39 | |
Jenkins Subversion Plugin | =1.40 | |
Jenkins Subversion Plugin | =1.41 | |
Jenkins Subversion Plugin | =1.42 | |
Jenkins Subversion Plugin | =1.43 | |
Jenkins Subversion Plugin | =1.44 | |
Jenkins Subversion Plugin | =1.45 | |
Jenkins Subversion Plugin | =1.46 | |
Jenkins Subversion Plugin | =1.47 | |
Jenkins Subversion Plugin | =1.48 | |
Jenkins Subversion Plugin | =1.49 | |
Jenkins Subversion Plugin | =1.50 | |
Jenkins Subversion Plugin | =1.51 | |
Jenkins Subversion Plugin | =1.52 | |
maven/org.jenkins-ci.plugins:subversion | <1.54 | 1.54 |
<=1.53 | ||
=1.0 | ||
=1.1 | ||
=1.2 | ||
=1.3 | ||
=1.4 | ||
=1.5 | ||
=1.6 | ||
=1.7 | ||
=1.8 | ||
=1.9 | ||
=1.10 | ||
=1.11 | ||
=1.12 | ||
=1.13 | ||
=1.14 | ||
=1.15 | ||
=1.16 | ||
=1.17 | ||
=1.18 | ||
=1.19 | ||
=1.20 | ||
=1.21 | ||
=1.22 | ||
=1.23 | ||
=1.24 | ||
=1.25 | ||
=1.26 | ||
=1.27 | ||
=1.28 | ||
=1.29 | ||
=1.30 | ||
=1.31 | ||
=1.32 | ||
=1.33 | ||
=1.34 | ||
=1.35 | ||
=1.36 | ||
=1.37 | ||
=1.38 | ||
=1.39 | ||
=1.40 | ||
=1.41 | ||
=1.42 | ||
=1.43 | ||
=1.44 | ||
=1.45 | ||
=1.46 | ||
=1.47 | ||
=1.48 | ||
=1.49 | ||
=1.50 | ||
=1.51 | ||
=1.52 |
https://github.com/jenkinsci/subversion-plugin/commit/7d4562d6f7e40de04bbe29577b51c79f07d05ba6
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6372 is considered a medium severity vulnerability due to the insecure storage of passwords.
To fix CVE-2013-6372, update the Jenkins Subversion Plugin to version 1.53 or higher.
CVE-2013-6372 affects Jenkins Subversion Plugin versions up to and including 1.52.
CVE-2013-6372 allows attackers to easily decode stored ssh-key passphrases due to base64 encoding.
CVE-2013-6372 was reported by Kohsuke Kawaguchi.