Loading HuntDB...

CVE-2020-2250

UNKNOWN
Published 2020-09-01T13:50:35
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2020-2250. We'll provide specific mitigation strategies based on your environment and risk profile.

No CVSS data available

Description

Jenkins SoapUI Pro Functional Testing Plugin 1.3 and earlier stores project passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by attackers with Extended Read permission, or access to the Jenkins controller file system.

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

Affected Products

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

✓ GitHub Reviewed MODERATE

Passwords stored in plain text by Jenkins ReadyAPI Functional Testing Plugin

GHSA-ccwp-633j-g29v

Advisory Details

ReadyAPI Functional Testing Plugin 1.3 and earlier stores project passwords unencrypted in job `config.xml` files as part of its configuration. These project passwords can be viewed by attackers with Extended Read permission or access to the Jenkins controller file system. ReadyAPI Functional Testing Plugin 1.4 stores project passwords encrypted once affected job configurations are saved again.

Affected Packages

Maven org.jenkins-ci.plugins:soapui-pro-functional-testing
ECOSYSTEM: ≥0 <1.4

CVSS Scoring

CVSS Score

5.0

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Advisory provided by GitHub Security Advisory Database. Published: May 24, 2022, Modified: December 20, 2022

References

Published: 2020-09-01T13:50:35
Last Modified: 2024-08-04T07:01:41.201Z
Copied to clipboard!