First published: Fri Jan 26 2018(Updated: )
Jenkins Build-Publisher plugin version 1.21 and earlier stores credentials to other Jenkins instances in the file hudson.plugins.build_publisher.BuildPublisher.xml in the Jenkins master home directory. These credentials were stored unencrypted, allowing anyone with local file system access to access them. Additionally, the credentials were also transmitted in plain text as part of the configuration form. This could result in exposure of the credentials through browser extensions, cross-site scripting vulnerabilities, and similar situations.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Relution Enterprise Appstore Publisher | <=1.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-1000387 is classified as high due to the unencrypted storage of credentials.
To fix CVE-2017-1000387, upgrade the Build-Publisher plugin to version 1.22 or later.
CVE-2017-1000387 affects Jenkins Build-Publisher plugin versions 1.21 and earlier.
CVE-2017-1000387 exposes unencrypted credentials stored in the Jenkins master home directory.
CVE-2017-1000387 cannot be exploited remotely; it requires local file system access to the Jenkins instance.