First published: Wed Apr 12 2023(Updated: )
Jenkins Report Portal Plugin 0.5 and earlier does not mask ReportPortal access tokens displayed on the configuration form, increasing the potential for attackers to observe and capture them.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Report Portal | <=0.5 | |
<=0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-30524 has been classified as a high severity vulnerability due to its potential to expose sensitive access tokens.
To fix CVE-2023-30524, upgrade the Jenkins Report Portal Plugin to version 0.6 or later which addresses this security issue.
CVE-2023-30524 represents an information exposure vulnerability where access tokens are not masked in the configuration form.
If you are using Jenkins Report Portal Plugin version 0.5 or earlier, your system is vulnerable to CVE-2023-30524.
The potential impacts of CVE-2023-30524 include unauthorized access to sensitive data and compromise of system security due to exposed access tokens.