CVE-2022-34801
UNKNOWN
Published 2022-06-30T17:48:09
Actions:
Expert Analysis
Professional remediation guidance
Get tailored security recommendations from our analyst team for CVE-2022-34801. We'll provide specific mitigation strategies based on your environment and risk profile.
No CVSS data available
Description
Jenkins Build Notifications Plugin 1.5.0 and earlier transmits tokens in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.
Available Exploits
No exploits available for this CVE.
Related News
No news articles found for this CVE.
Affected Products
Affected Versions:
GitHub Security Advisories
Community-driven vulnerability intelligence from GitHub
✓ GitHub Reviewed
LOW
Cleartext Storage of Sensitive Information in Jenkins Build Notifications Plugin
GHSA-7298-w54j-q7wmAdvisory Details
Jenkins Build Notifications Plugin 1.5.0 and earlier transmits tokens in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.
Affected Packages
Maven
tools.devnull:build-notifications
ECOSYSTEM:
≥0
≤1.5.0
CVSS Scoring
CVSS Score
2.5
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
References
Advisory provided by GitHub Security Advisory Database. Published: July 1, 2022, Modified: December 9, 2022
Published: 2022-06-30T17:48:09
Last Modified: 2024-08-03T09:22:10.664Z
Copied to clipboard!