CVE-2023-50773
UNKNOWN
Published 2023-12-13T17:30:19.459Z
Actions:
Expert Analysis
Professional remediation guidance
Get tailored security recommendations from our analyst team for CVE-2023-50773. We'll provide specific mitigation strategies based on your environment and risk profile.
No CVSS data available
Description
Jenkins Dingding JSON Pusher Plugin 2.0 and earlier does not mask access tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them.
Available Exploits
No exploits available for this CVE.
Related News
No news articles found for this CVE.
Affected Products
Affected Versions:
GitHub Security Advisories
Community-driven vulnerability intelligence from GitHub
✓ GitHub Reviewed
MODERATE
Displayed in plain text by Dingding JSON Pusher Plugin
GHSA-q5cj-xf99-79m8Advisory Details
Jenkins Dingding JSON Pusher Plugin 2.0 and earlier does not mask access tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them.
Affected Packages
Maven
com.zintow:dingding-json-pusher
ECOSYSTEM:
≥0
≤2.0
CVSS Scoring
CVSS Score
5.0
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
References
Advisory provided by GitHub Security Advisory Database. Published: December 13, 2023, Modified: December 18, 2023
References
Published: 2023-12-13T17:30:19.459Z
Last Modified: 2025-02-13T17:19:36.476Z
Copied to clipboard!