First published: Tue Mar 29 2022(Updated: )
Jenkins Proxmox Plugin 0.5.0 and earlier stores the Proxmox Datacenter password unencrypted in the global config.xml file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:proxmox | <0.6.0 | 0.6.0 |
Jenkins Proxmox | <=0.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-28141 is rated as a high severity vulnerability due to the exposure of sensitive credentials.
To fix CVE-2022-28141, upgrade the Jenkins Proxmox Plugin to version 0.6.0 or later.
CVE-2022-28141 affects Jenkins Proxmox Plugin versions 0.5.0 and earlier.
CVE-2022-28141 compromises the unencrypted Proxmox Datacenter password stored in the global config.xml file.
Any user with access to the Jenkins controller file system can view the sensitive data exposed by CVE-2022-28141.