First published: Tue Sep 01 2020(Updated: )
Jenkins SoapUI Pro Functional Testing Plugin 1.3 and earlier stores project passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by attackers with Extended Read permission, or access to the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Soapui Pro Functional Testing | <=1.3 | |
maven/org.jenkins-ci.plugins:soapui-pro-functional-testing | <=1.3 | 1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2020-2250.
The severity of CVE-2020-2250 is medium with a CVSS score of 6.5.
The affected software for CVE-2020-2250 is Jenkins SoapUI Pro Functional Testing Plugin 1.3 and earlier.
Project passwords are stored unencrypted in job config.xml files as part of the plugin's configuration.
Attackers with Extended Read permission or access to the Jenkins controller file system can view the project passwords.