CVE-2023-50772

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-50772
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-50772.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-50772
Aliases
Withdrawn
2024-09-03T04:41:28.214696Z
Published
2023-12-13T18:15:44Z
Modified
2024-09-03T04:36:20.989711Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

Jenkins Dingding JSON Pusher Plugin 2.0 and earlier stores access tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.

References

Affected packages

Git / github.com/jenkinsci/dingding-json-pusher-plugin

Affected ranges

Type
GIT
Repo
https://github.com/jenkinsci/dingding-json-pusher-plugin
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

dingding-json-pusher-1.*

dingding-json-pusher-1.1
dingding-json-pusher-1.2

dingding-json-pusher-2.*

dingding-json-pusher-2.0

v1.*

v1.0