First published: Thu Jun 30 2022(Updated: )
Jenkins RocketChat Notifier Plugin 1.5.2 and earlier stores the login password and webhook token unencrypted in its global configuration file `RocketChatNotifier.xml` on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Rocketchat Notifier | <=1.5.2 | |
maven/org.jenkins-ci.plugins:rocketchatnotifier | <=1.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34802 is a vulnerability in the Jenkins RocketChat Notifier Plugin 1.5.2 and earlier that allows the login password and webhook token to be stored unencrypted in its global configuration file on the Jenkins controller, making them accessible to users with access to the Jenkins controller file system.
CVE-2022-34802 has a severity score of 4.3 out of 10, which is considered medium.
The Jenkins RocketChat Notifier Plugin version 1.5.2 and earlier is affected by CVE-2022-34802.
This vulnerability can be exploited by users with access to the Jenkins controller file system, who can view the unencrypted login password and webhook token in the global configuration file.
To fix CVE-2022-34802, you should update to a version of the Jenkins RocketChat Notifier Plugin that is later than version 1.5.2.