First published: Tue Sep 01 2020(Updated: )
Jenkins SoapUI Pro Functional Testing Plugin 1.5 and earlier transmits project passwords in its configuration in plain text as part of job configuration forms, potentially resulting in their exposure.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Jenkins | <2.236 | |
Jenkins Soapui Pro Functional Testing | <=1.5 | |
maven/org.jenkins-ci.plugins:soapui-pro-functional-testing | <=1.5 | 1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2251 is a vulnerability found in Jenkins SoapUI Pro Functional Testing Plugin 1.5 and earlier versions, where project passwords are transmitted in plain text as part of the global configuration.
CVE-2020-2251 has a severity rating of 4.3, which is considered medium.
Jenkins Jenkins 2.236, Jenkins Soapui Pro Functional Testing Plugin up to version 1.5, and org.jenkins-ci.plugins:soapui-pro-functional-testing up to version 1.5 are affected by CVE-2020-2251.
Project passwords are stored in job `config.xml` files on the Jenkins controller as part of the plugin's configuration.
To fix CVE-2020-2251, upgrade to ReadyAPI Functional Testing Plugin version 1.6 or later.