First published: Tue Mar 15 2022(Updated: )
Jenkins GitLab Authentication Plugin 1.13 and earlier stores the GitLab client secret unencrypted in the global config.xml file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins GitLab Authentication Plugin | <=1.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-27206 has a moderate severity rating due to the exposure of sensitive data.
To fix CVE-2022-27206, upgrade the Jenkins GitLab Authentication Plugin to version 1.14 or later.
CVE-2022-27206 exposes the GitLab client secret in an unencrypted format within the global config.xml file.
Any Jenkins instance using GitLab Authentication Plugin versions 1.13 and earlier is affected by CVE-2022-27206.
Users should immediately update their Jenkins GitLab Authentication Plugin and review access controls to the Jenkins controller file system.