First published: Thu Apr 16 2020(Updated: )
Copr Plugin 0.3 and earlier stores credentials unencrypted in job `config.xml` files as part of its configuration. These credentials can be viewed by users with Extended Read permission or access to the Jenkins controller file system. Copr Plugin 0.6.1 stores these credentials encrypted. This change is effective once the job configuration is saved the next time.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Copr | <=0.3 | |
maven/org.fedoraproject.jenkins.plugins:copr | <=0.3 | 0.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2177 is considered a medium severity vulnerability due to the potential exposure of sensitive credentials.
To fix CVE-2020-2177, upgrade the Copr Plugin to version 0.6.1 or later to ensure credentials are stored securely.
The risks associated with CVE-2020-2177 include unauthorized users gaining access to unencrypted credentials stored in Jenkins job configurations.
CVE-2020-2177 affects Copr Plugin versions 0.3 and earlier.
Using Copr Plugin 0.3 is not secure, and it is recommended to upgrade to at least version 0.6.1.