First published: Thu Jul 02 2020(Updated: )
Jenkins TestComplete support Plugin 2.4.1 and earlier stores a password unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Testcomplete Support | <=2.4.1 | |
maven/org.jenkins-ci.plugins:TestComplete | <2.5.2 | 2.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2020-2209.
Jenkins TestComplete support Plugin versions 2.4.1 and earlier are affected by this vulnerability.
This vulnerability stores a password unencrypted in job `config.xml` files on the Jenkins master where it can be viewed by users with Extended Read permission or access to the master file system.
The vulnerability can be patched by updating the Jenkins TestComplete support Plugin to version 2.5.2 or later.
The severity of this vulnerability is medium, with a severity value of 4.3.