This vulnerability allows local attackers to disclose sensitive information on affected installations of Jenkins iceScrum. Authentication is required to exploit this vulnerability. The specific flaw exists within the iceScrum plugin. The issue results from storing credentials in plaintext. An attacker can leverage this vulnerability to execute code in the context of the build process.
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins iceScrum |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-8882 is considered to be moderate due to the potential exposure of sensitive information.
To fix ZDI-CAN-8882, update the iceScrum plugin to the latest version without stored credentials.
ZDI-CAN-8882 affects installations of Jenkins iceScrum that have the vulnerable plugin installed.
Authentication is required to exploit the ZDI-CAN-8882 vulnerability.
The main issue in ZDI-CAN-8882 is the insecure storage of credentials within the iceScrum plugin.