Loading HuntDB...

GHSA-7ff8-qfwx-8gx5

GitHub Security Advisory

Improper masking of some secrets in Jenkins Credentials Binding Plugin

✓ GitHub Reviewed LOW Has CVE

Advisory Details

Credentials Binding Plugin allows specifying passwords and other secrets as environment variables, and will hide them from console output in builds. As a side effect of the fix for [SECURITY-698](https://www.jenkins.io/security/advisory/2018-02-05/#credentials-binding), `$` characters in secrets are escaped to `$$`. This will then be expanded to $ again once the secret is passed to (post) build steps.

Credentials Binding Plugin 1.22 and earlier does not mask the escaped form of the secret (containing `$$`). This occurs for example in the \"Execute Maven top-level targets\" build step included in Jenkins.\n\nCredentials Binding Plugin 1.23 now masks secrets both in their original form and with escaped `$` characters, so they will be masked even if printed before value expansion.

Affected Packages

Maven org.jenkins-ci.plugins:credentials-binding
Affected versions: 0 (fixed in 1.23)

Related CVEs

Key Information

GHSA ID
GHSA-7ff8-qfwx-8gx5
Published
May 24, 2022 5:17 PM
Last Modified
December 16, 2022 10:25 PM
CVSS Score
2.5 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:credentials-binding
GitHub Reviewed
✓ Yes

Dataset

Last updated: August 24, 2025 6:28 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.