First published: Wed Apr 12 2023(Updated: )
Jenkins WSO2 Oauth Plugin 1.0 and earlier stores the WSO2 Oauth client secret unencrypted in the global config.xml file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
<=1.0 | ||
Jenkins Wso2 Oauth | <=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-30527 has been classified as a high-severity vulnerability due to the unencrypted storage of sensitive client secrets.
To fix CVE-2023-30527, upgrade the WSO2 Oauth Plugin to a version later than 1.0 where the client secret is stored securely.
The risks associated with CVE-2023-30527 include potential exposure of the WSO2 Oauth client secret to unauthorized users, leading to account compromise.
CVE-2023-30527 affects WSO2 Oauth Plugin version 1.0 and earlier.
In CVE-2023-30527, the WSO2 Oauth client secret is stored unencrypted in the global config.xml file on the Jenkins controller.