First published: Wed Sep 21 2022(Updated: )
Jenkins CONS3RT Plugin 1.0.0 and earlier stores Cons3rt API token unencrypted in job config.xml files on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Cons3rt | <=1.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41255 has been rated as a Medium severity vulnerability.
To fix CVE-2022-41255, upgrade the Jenkins CONS3RT Plugin to version 1.0.1 or later.
CVE-2022-41255 affects Jenkins CONS3RT Plugin versions 1.0.0 and earlier.
CVE-2022-41255 is a security vulnerability that involves unencrypted storage of sensitive API tokens.
Yes, users with access to the Jenkins controller file system can view the unencrypted API tokens affected by CVE-2022-41255.