First published: Wed Nov 04 2020(Updated: )
Jenkins AppSpider Plugin 1.0.12 and earlier stores a password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Appspider | <=1.0.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2314 is classified as a medium severity vulnerability due to the exposure of unencrypted passwords.
To fix CVE-2020-2314, upgrade the Jenkins AppSpider Plugin to version 1.0.13 or later.
The risks associated with CVE-2020-2314 include unauthorized access to sensitive data if unauthorized users can access the Jenkins controller file system.
CVE-2020-2314 affects Jenkins AppSpider Plugin versions 1.0.12 and earlier.
Users of Jenkins with the AppSpider Plugin installed prior to version 1.0.13 are impacted by CVE-2020-2314.