First published: Tue Aug 31 2021(Updated: )
Jenkins Nomad Plugin 0.7.4 and earlier stores Docker passwords unencrypted in the global config.xml file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Nomad | <=0.7.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21681 is classified as a medium severity vulnerability due to the potential for unauthorized access to sensitive information.
To fix CVE-2021-21681, you should upgrade to Jenkins Nomad Plugin version 0.7.5 or later, which addresses the unencrypted password storage issue.
The risks include potential exposure of Docker passwords to unauthorized users with access to the Jenkins controller file system.
Jenkins Nomad Plugin versions 0.7.4 and earlier are affected by CVE-2021-21681.
Yes, CVE-2021-21681 involves sensitive data exposure as it allows Docker passwords to be stored unencrypted.