First published: Tue Jan 24 2023(Updated: )
Jenkins view-cloner Plugin 1.1 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins View-cloner | =1.0 | |
Jenkins View-cloner | =1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-24450 has a medium severity rating due to the potential exposure of sensitive information.
To fix CVE-2023-24450, upgrade to the latest version of the Jenkins view-cloner plugin that eliminates unencrypted password storage.
Users of Jenkins view-cloner Plugin version 1.1 and earlier are affected by CVE-2023-24450.
CVE-2023-24450 poses risks of unauthorized access to stored passwords by users with Extended Read permissions.
Not addressing CVE-2023-24450 can lead to a potential data breach due to exposed credentials stored in job config.xml files.