First published: Tue Jan 24 2023(Updated: )
Jenkins JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier transmits the private key in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Jira Pipeline Steps | <=2.0.165.v8846cf59f3db |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-24440 is considered important due to the potential exposure of private keys.
To fix CVE-2023-24440, upgrade the Jenkins JIRA Pipeline Steps Plugin to version 2.0.166 or later.
CVE-2023-24440 introduces a risk of exposing private keys due to their transmission in plain text.
CVE-2023-24440 affects Jenkins JIRA Pipeline Steps Plugin versions 2.0.165.v8846cf59f3db and earlier.
The mitigation for CVE-2023-24440 is to update to the latest version of the Jenkins JIRA Pipeline Steps Plugin.