First published: Wed Feb 12 2020(Updated: )
Jenkins DigitalOcean Plugin 1.1 and earlier stores a token unencrypted in the global config.xml file on the Jenkins master where it can be viewed by users with access to the master file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Digitalocean | <=1.1 | |
maven/com.dubture.jenkins:digitalocean-plugin | <=1.1 | 1.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2126 is classified as a medium severity vulnerability.
To fix CVE-2020-2126, update the Jenkins DigitalOcean Plugin to version 1.2.0 or later.
The risks of CVE-2020-2126 include unauthorized access to sensitive tokens stored unencrypted in the config.xml file.
Versions of the Jenkins DigitalOcean Plugin up to and including 1.1 are affected by CVE-2020-2126.
Users with access to the Jenkins master file system can exploit CVE-2020-2126.