Loading HuntDB...

GHSA-3858-58w9-wpcg

GitHub Security Advisory

Jenkins OpenId Connect Authentication Plugin showed plain text client secret in configuration form

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

An exposure of sensitive information vulnerability exists in Jenkins OpenId Connect Authentication Plugin 1.4 and earlier in OicSecurityRealm/config.jelly that allows attackers able to view a Jenkins administrator's web browser output, or control the browser (e.g. malicious extension) to retrieve the configured client secret.

Affected Packages

Maven org.jenkins-ci.plugins:oic-auth
Affected versions: 0 (fixed in 1.5)

Related CVEs

Key Information

GHSA ID
GHSA-3858-58w9-wpcg
Published
May 13, 2022 1:31 AM
Last Modified
January 30, 2024 10:28 PM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:oic-auth
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 1, 2025 6:26 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.