First published: Wed Jun 22 2022(Updated: )
Jenkins EasyQA Plugin 1.0 and earlier stores user passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Easyqa | <=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34202 has a medium severity rating due to the risk of unauthorized access to sensitive user passwords.
To fix CVE-2022-34202, upgrade the Jenkins EasyQA Plugin to version 1.1 or later, which resolves the unencrypted password storage issue.
The risks associated with CVE-2022-34202 include potential exposure of user passwords to any user with file system access to the Jenkins controller.
CVE-2022-34202 affects Jenkins EasyQA Plugin version 1.0 and earlier.
If you cannot upgrade, you should implement strict file system permissions to limit access to the Jenkins controller configuration file.