First published: Tue Mar 15 2022(Updated: )
Jenkins Parameterized Trigger Plugin 2.43 and earlier captures environment variables passed to builds triggered using Jenkins Parameterized Trigger Plugin, including password parameter values, in their `build.xml` files. These values are stored unencrypted and can be viewed by users with access to the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Parameterized Trigger | <2.43.1 | |
maven/org.jenkins-ci.plugins:parameterized-trigger | <2.43.1 | 2.43.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-27195 has been rated as high severity due to the exposure of sensitive information, including unencrypted password parameters.
To fix CVE-2022-27195, update the Jenkins Parameterized Trigger Plugin to version 2.43.1 or later.
CVS-2022-27195 affects users of Jenkins Parameterized Trigger Plugin versions 2.43 and earlier.
CVE-2022-27195 exposes environment variables, including sensitive password parameter values, stored in `build.xml` files.
Yes, users with access to the Jenkins builds can potentially view the unencrypted sensitive information captured by CVE-2022-27195.