Jenkins Build-Publisher plugin version 1.21 and earlier stores credentials to other Jenkins instances in the file hudson.plugins.build_publisher.BuildPublisher.xml in the Jenkins master home directory. These credentials were stored unencrypted, allowing anyone with local file system access to access them. Additionally, the credentials were also transmitted in plain text as part of the configuration form. This could result in exposure of the credentials through browser extensions, cross-site scripting vulnerabilities, and similar situations.
References
Link | Resource |
---|---|
https://jenkins.io/security/advisory/2017-10-23/ | Vendor Advisory |
http://www.securityfocus.com/bid/101544 | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2018-01-25 18:29
Updated : 2019-10-02 17:03
NVD link : CVE-2017-1000387
Mitre link : CVE-2017-1000387
JSON object : View
CWE
CWE-522
Insufficiently Protected Credentials
Products Affected
jenkins
- build-publisher