First published: Wed Sep 16 2020(Updated: )
Jenkins ElasTest Plugin 1.2.1 and earlier stores its server password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:elastest | <=1.2.1 | |
Jenkins | <=1.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2274 is considered a high severity vulnerability due to the exposure of unencrypted credentials.
To fix CVE-2020-2274, upgrade the Jenkins ElasTest Plugin to version 1.2.2 or later, where the vulnerability is addressed.
The risks associated with CVE-2020-2274 include unauthorized access to sensitive information stored in the Jenkins configuration file.
CVE-2020-2274 affects users of Jenkins ElasTest Plugin versions 1.2.1 and earlier.
CVE-2020-2274 exposes the server password as it is stored unencrypted in the global configuration file of Jenkins.