First published: Mon Mar 09 2020(Updated: )
Jenkins Zephyr for JIRA Test Management Plugin 1.5 and earlier stores its credentials in plain text in a global configuration file on the Jenkins master file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:zephyr-for-jira-test-management | <=1.5 | |
Jenkins Zephyr For Jira Test Management | <=1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2154 is classified as a high severity vulnerability due to the exposure of sensitive credentials.
To fix CVE-2020-2154, upgrade the Zephyr for JIRA Test Management Plugin to version 1.6 or later.
CVE-2020-2154 introduces risks related to unauthorized access since credentials are stored in plain text.
CVE-2020-2154 affects users of Jenkins running Zephyr for JIRA Test Management Plugin versions up to 1.5.
Yes, CVE-2020-2154 can be easily exploited by anyone with access to the Jenkins master file system.