First published: Thu Jun 30 2022(Updated: )
Jenkins Cisco Spark Plugin 1.1.1 and earlier stores bearer tokens unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Cisco Spark | <=1.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for Jenkins Cisco Spark Plugin is CVE-2022-34808.
The severity of CVE-2022-34808 is medium with a severity value of 4.3.
Jenkins Cisco Spark Plugin 1.1.1 and earlier stores bearer tokens unencrypted in its global configuration file.
The bearer tokens are stored in the global configuration file on the Jenkins controller.
The bearer tokens can be viewed by users with access to the Jenkins controller file system.
To fix the vulnerability in Jenkins Cisco Spark Plugin, update to a version newer than 1.1.1 that addresses the issue.
You can find more information about CVE-2022-34808 in the Jenkins security advisory: https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2055