First published: Tue Mar 15 2022(Updated: )
Jenkins dbCharts Plugin 0.5.2 and earlier stores JDBC connection passwords unencrypted in its global configuration file `hudson.plugins.dbcharts.DbChartPublisher.xml` on the Jenkins controller as part of its configuration. These passwords can be viewed by users with access to the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:dbCharts | <=0.5.2 | |
Jenkins | <=0.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-27216 is classified as a medium severity vulnerability due to the exposure of sensitive information.
To fix CVE-2022-27216, upgrade the Jenkins dbCharts Plugin to version 0.5.3 or later.
CVE-2022-27216 affects JDBC connection passwords that are stored unencrypted in the configuration file.
Users with access to the Jenkins controller may view the unencrypted passwords affected by CVE-2022-27216.
The impact of CVE-2022-27216 includes potential unauthorized access to databases due to exposed JDBC passwords.