First published: Tue Mar 30 2021(Updated: )
Jenkins Jabber (XMPP) notifier and control Plugin 1.41 and earlier stores passwords unencrypted in its global configuration file `hudson.plugins.jabber.im.transport.JabberPublisher.xml` on the Jenkins controller as part of its configuration. These passwords can be viewed by users with access to the Jenkins controller file system. Jenkins Jabber (XMPP) notifier and control Plugin 1.42 stores passwords encrypted once its configuration is saved again.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jvnet.hudson.plugins:jabber | <=1.41 | 1.42 |
Jenkins Jabber (XMPP) Notifier and Control | <=1.41 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21634 has been assigned a medium severity rating due to the exposure of unencrypted passwords.
To fix CVE-2021-21634, upgrade the Jenkins Jabber notifier and control Plugin to version 1.42 or later.
The consequences of CVE-2021-21634 include unauthorized access to sensitive credentials by users with configuration file access.
CVE-2021-21634 affects Jenkins Jabber notifier and control Plugin versions up to and including 1.41.
Users who have installed the affected versions of the Jenkins Jabber notifier and control Plugin are impacted by CVE-2021-21634.