First published: Wed Apr 12 2023(Updated: )
Jenkins Report Portal Plugin 0.5 and earlier stores ReportPortal access tokens unencrypted in job config.xml files on the Jenkins controller as part of its configuration where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Report Portal | <=0.5 | |
<=0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-30523 is considered a high severity vulnerability due to the exposure of unencrypted access tokens.
To fix CVE-2023-30523, upgrade the Jenkins Report Portal Plugin to version 0.6 or later.
CVE-2023-30523 affects Jenkins installations using Report Portal Plugin versions 0.5 and earlier.
CVE-2023-30523 exposes ReportPortal access tokens stored unencrypted in job config.xml files.
Users with Item/Extended Read permission or access to the Jenkins controller file system can exploit CVE-2023-30523.