First published: Wed Feb 12 2020(Updated: )
Jenkins Dynamic Extended Choice Parameter Plugin 1.0.1 and earlier stores a password unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Dynamic Extended Choice Parameter | <=1.0.1 | |
maven/com.moded.extendedchoiceparameter:dynamic_extended_choice_parameter | <=1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-2124.
CVE-2020-2124 has a severity rating of 4.3 out of 10, which is considered medium.
Jenkins Dynamic Extended Choice Parameter Plugin 1.0.1 and earlier versions are affected by CVE-2020-2124.
CVE-2020-2124 allows the password to be stored unencrypted in job config.xml files, making it visible to users with Extended Read permission or access to the master file system.
To mitigate CVE-2020-2124, update to a version of Jenkins Dynamic Extended Choice Parameter Plugin that is not affected by the vulnerability.