First published: Tue Jan 24 2023(Updated: )
Jenkins TestQuality Updater Plugin 1.3 and earlier stores the TestQuality Updater password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Testquality Updater | <=1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-24454 has been classified as a high severity vulnerability due to the exposure of sensitive unencrypted credentials.
To fix CVE-2023-24454, update the Jenkins TestQuality Updater Plugin to version 1.4 or later, which addresses the security issue.
The risks include unauthorized access to sensitive data as the TestQuality Updater password is stored unencrypted on the Jenkins controller.
CVE-2023-24454 affects users of Jenkins TestQuality Updater Plugin versions 1.3 and earlier.
There are no official workarounds for CVE-2023-24454 other than upgrading to a secure version of the plugin.