First published: Wed Aug 16 2023(Updated: )
Jenkins Config File Provider Plugin 952.va_544a_6234b_46 and earlier does not mask (i.e., replace with asterisks) credentials specified in configuration files when they're written to the build log.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Config File Provider | <=952.va_544a_6234b_46 | |
maven/org.jenkins-ci.plugins:config-file-provider | <953.v0432a | 953.v0432a |
redhat/Config File Provider Plugin | <953. | 953. |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40339 is a vulnerability in Jenkins Config File Provider Plugin versions 952.va_544a_6234b_46 and earlier that allows credentials specified in configuration files to be exposed in the build log.
CVE-2023-40339 has a severity rating of 7.5 (high).
The affected software for CVE-2023-40339 includes Jenkins Config File Provider Plugin versions 952.va_544a_6234b_46 and earlier.
To fix CVE-2023-40339, upgrade to version 953.v0432a or later of the Jenkins Config File Provider Plugin.
You can find more information about CVE-2023-40339 in the following references: [NVD](https://nvd.nist.gov/vuln/detail/CVE-2023-40339), [Jenkins Security Advisory](https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3090), [GitHub Advisory](https://github.com/advisories/GHSA-pv2g-vm98-vjxf).