First published: Thu Jun 30 2022(Updated: )
Jenkins RQM Plugin 2.8 and earlier stores a password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/net.praqma:rqm-plugin | <=2.8 | |
IBM Rational Quality Manager (RQM) | <=2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34809 has been classified as a medium severity vulnerability due to the exposure of sensitive passwords.
To fix CVE-2022-34809, users should upgrade to Jenkins RQM Plugin version 2.9 or later where the issue has been addressed.
CVE-2022-34809 is a security vulnerability related to the insecure storage of passwords in the configuration file.
CVE-2022-34809 affects users of Jenkins RQM Plugin versions 2.8 and earlier.
Yes, CVE-2022-34809 can potentially allow unauthorized users to view sensitive configuration details, including passwords.