First published: Wed Jan 13 2021(Updated: )
Jenkins Bumblebee HP ALM Plugin 4.1.5 and earlier stores credentials unencrypted in its global configuration file `com.agiletestware.bumblebee.BumblebeeGlobalConfig.xml` on the Jenkins controller as part of its configuration. These credentials can be viewed by users with access to the Jenkins controller file system. Jenkins Bumblebee HP ALM Plugin 4.1.6 stores credentials encrypted once its configuration is saved again.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Bumblebee Hp Alm | <=4.1.5 | |
maven/org.jenkins-ci.plugins:bumblebee | <=4.1.5 | 4.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21614 is classified as a high-severity vulnerability due to the exposure of unencrypted credentials.
To fix CVE-2021-21614, update the Jenkins Bumblebee HP ALM Plugin to version 4.1.6 or later.
CVE-2021-21614 allows unauthorized users with access to the Jenkins controller to view sensitive credentials.
CVE-2021-21614 affects all versions of Jenkins Bumblebee HP ALM Plugin up to and including 4.1.5.
There are no known workarounds for CVE-2021-21614, upgrading to a fixed version is the recommended action.