This vulnerability allows local attackers to disclose sensitive information on affected installations of Jenkins. Authentication is required to exploit this vulnerability. The specific flaw exists within the dingding-notifications plugin. The issue results from storing credentials in plaintext. An attacker can leverage this vulnerability to execute code in the context of the build process.
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins dingding-notifications |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-8833 is considered high due to the potential for sensitive information disclosure.
To fix ZDI-CAN-8833, upgrade the dingding-notifications plugin to the latest version as recommended in the security advisory.
ZDI-CAN-8833 affects installations of Jenkins that use the dingding-notifications plugin.
No, ZDI-CAN-8833 requires local access to the Jenkins installation to exploit.
ZDI-CAN-8833 can lead to the disclosure of sensitive credentials stored in the dingding-notifications plugin.