First published: Wed Feb 12 2020(Updated: )
Jenkins BMC Release Package and Deployment Plugin 1.1 and earlier stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Bmc Release Package And Deployment | <=1.1 | |
maven/RPD:bmc-rpd | <=1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2127 is rated as a medium severity vulnerability due to the exposure of unencrypted credentials.
To fix CVE-2020-2127, upgrade to Jenkins BMC Release Package and Deployment Plugin version 1.2 or later.
CVE-2020-2127 allows unauthorized users with file system access to view sensitive unencrypted credentials.
CVE-2020-2127 affects versions 1.1 and earlier of the Jenkins BMC Release Package and Deployment Plugin.
As a workaround for CVE-2020-2127, consider restricting access to the Jenkins master file system to prevent unauthorized users from viewing the credentials.