First published: Thu Oct 08 2020(Updated: )
Jenkins SMS Notification Plugin 1.2 and earlier stores an access token unencrypted in its global configuration file `com.hoiio.jenkins.plugin.SMSNotification.xml` on the Jenkins controller as part of its configuration. This access token can be viewed by users with access to the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Sms Notification | <=1.2 | |
maven/com.hoiio.jenkins:sms | <=1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2297 refers to a vulnerability in the Jenkins SMS Notification Plugin version 1.2 and earlier.
CVE-2020-2297 allows users with access to the Jenkins controller to view the unencrypted access token stored in the global configuration file of the Jenkins SMS Notification Plugin.
CVE-2020-2297 has a severity rating of 3.3 (low).
To mitigate CVE-2020-2297, upgrade to a version of the Jenkins SMS Notification Plugin that is secure and no longer stores the access token unencrypted in the global configuration file.
You can find more information about CVE-2020-2297 on the Openwall, Jenkins, and NVD websites using the provided references: http://www.openwall.com/lists/oss-security/2020/10/08/5, https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-2054, https://nvd.nist.gov/vuln/detail/CVE-2020-2297.