First published: Thu Jun 30 2022(Updated: )
Deployment Dashboard Plugin 1.0.10 and earlier stores a password unencrypted in its global configuration file `de.codecentric.jenkins.dashboard.DashboardView.xml` on the Jenkins controller as part of its configuration. This password can be viewed by users with access to the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Deployment Dashboard | <=1.0.10 | |
maven/org.jenkins-ci.plugins:ec2-deployment-dashboard | <=1.0.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-34799.
The title of the vulnerability is 'Jenkins Deployment Dashboard Plugin 1.0.10 and earlier stores a password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.'
The severity of CVE-2022-34799 is medium, with a severity value of 4.3.
The Jenkins Deployment Dashboard Plugin version 1.0.10 and earlier is affected by CVE-2022-34799.
The vulnerability, CVE-2022-34799, can be exploited by users with access to the Jenkins controller file system to view a password that is stored unencrypted in the global configuration file of the plugin.