GHSA-6r5w-jjr5-qvgr

Suggest an improvement
Source
https://github.com/advisories/GHSA-6r5w-jjr5-qvgr
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/12/GHSA-6r5w-jjr5-qvgr/GHSA-6r5w-jjr5-qvgr.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-6r5w-jjr5-qvgr
Aliases
  • CVE-2023-50770
Published
2023-12-13T18:31:04Z
Modified
2024-11-15T22:32:11.341265Z
Severity
  • 6.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Password stored in a recoverable format by Jenkins OpenId Connect Authentication Plugin
Details

Jenkins OpenId Connect Authentication Plugin stores a password of a local user account used as an anti-lockout feature in a recoverable format, allowing attackers with access to the Jenkins controller file system to recover the plain text password of that account, likely gaining administrator access to Jenkins.

Database specific
{
    "nvd_published_at": "2023-12-13T18:15:44Z",
    "cwe_ids": [
        "CWE-312",
        "CWE-522"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2023-12-13T19:34:24Z"
}
References

Affected packages

Maven / org.jenkins-ci.plugins:oic-auth

Package

Name
org.jenkins-ci.plugins:oic-auth
View open source insights on deps.dev
Purl
pkg:maven/org.jenkins-ci.plugins/oic-auth

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.229.vf736b

Affected versions

1.*

1.0
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8

2.*

2.0.0
2.1
2.2
2.3
2.4
2.5
2.6

3.*

3.0

4.*

4.220.v22331f08e6a_3
4.223.v503b_9a_75a_8a_f
4.224.v62720cfa_026e
4.225.v03326773b_44b_
4.227.v36610663f760
4.228.v0c3e8682ff1f