First published: Wed Jun 22 2022(Updated: )
Jenkins Squash TM Publisher (Squash4Jenkins) Plugin 1.0.0 and earlier stores passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Squash Tm Publisher | <=1.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34213 is a vulnerability in the Jenkins Squash TM Publisher (Squash4Jenkins) Plugin 1.0.0 and earlier where passwords are stored unencrypted in its global configuration file on the Jenkins controller.
CVE-2022-34213 has a severity rating of medium, with a severity value of 6.5.
CVE-2022-34213 affects Jenkins through the Squash TM Publisher (Squash4Jenkins) Plugin 1.0.0 and earlier, where passwords are stored unencrypted in the global configuration file on the Jenkins controller.
To fix CVE-2022-34213, it is recommended to update the Jenkins Squash TM Publisher (Squash4Jenkins) Plugin to version 1.0.1 or later, where passwords are encrypted in the global configuration file.
More information about CVE-2022-34213 can be found in the Jenkins Security Advisory: https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2089