This vulnerability allows local attackers to disclose sensitive information on affected installations of Jenkins Caliper CI. Authentication is required to exploit this vulnerability. The specific flaw exists within the Caliper CI plugin. The issue results from storing credentials in plaintext. An attacker can leverage this vulnerability to execute code in the context of the build process.
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Caliper CI |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-8883 is categorized as a medium risk due to the potential for local attackers to disclose sensitive information.
To fix ZDI-CAN-8883, ensure that you update the Jenkins Caliper CI plugin to the latest patched version as recommended by the security advisory.
Organizations using affected installations of Jenkins Caliper CI are at risk of the ZDI-CAN-8883 vulnerability.
ZDI-CAN-8883 requires local authentication to exploit the vulnerability, meaning an attacker must have access to the system.
ZDI-CAN-8883 can potentially allow local attackers to disclose stored credentials and other sensitive information within the Jenkins Caliper CI environment.