GHSA-gvcj-72h4-8xm9

Suggest an improvement
Source
https://github.com/advisories/GHSA-gvcj-72h4-8xm9
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-gvcj-72h4-8xm9/GHSA-gvcj-72h4-8xm9.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-gvcj-72h4-8xm9
Aliases
  • CVE-2020-2151
Published
2022-05-24T17:10:28Z
Modified
2023-11-08T04:02:53.313781Z
Severity
  • 3.1 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N CVSS Calculator
Summary
Jenkins Quality Gates Plugin transmits credentials in plain text during configuration
Details

Quality Gates Plugin stores credentials in its global configuration file quality.gates.jenkins.plugin.GlobalConfig.xml on the Jenkins controller as part of its configuration. While the credentials are stored encrypted on disk, they are transmitted in plain text as part of the configuration form by Quality Gates Plugin 2.5 and earlier. This can result in exposure of the credential through browser extensions, cross-site scripting vulnerabilities, and similar situations.

Database specific
{
    "nvd_published_at": "2020-03-09T16:15:00Z",
    "github_reviewed_at": "2023-01-06T16:58:54Z",
    "severity": "LOW",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-319"
    ]
}
References

Affected packages

Maven / org.jenkins-ci.plugins:quality-gates

Package

Name
org.jenkins-ci.plugins:quality-gates
View open source insights on deps.dev
Purl
pkg:maven/org.jenkins-ci.plugins/quality-gates

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
2.5

Affected versions

2.*

2.2
2.3
2.5