First published: Tue Nov 15 2022(Updated: )
Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.143 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by attackers with Extended Read permission, or access to the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Ns-nd Integration Performance Publisher | <4.8.0.146 | |
maven/io.jenkins.plugins:cavisson-ns-nd-integration | <=4.8.0.143 | 4.8.0.146 |
<4.8.0.146 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-45392 has a moderate severity level due to the risk of sensitive information exposure.
To mitigate CVE-2022-45392, upgrade to version 4.8.0.146 or later of the Jenkins NS-ND Integration Performance Publisher Plugin.
CVE-2022-45392 affects passwords stored unencrypted in the job config.xml files on Jenkins controllers.
CVE-2022-45392 can be exploited by users with Extended Read permission or access to the Jenkins controller file system.
CVE-2022-45392 specifically impacts Jenkins NS-ND Integration Performance Publisher Plugin versions 4.8.0.143 and earlier.