Jenkins Violation Comments to GitLab Plugin has Insufficiently Protected Credentials
Moderate severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Dec 22, 2023
Package
Affected versions
< 2.29
Patched versions
2.29
Description
Published by the National Vulnerability Database
Sep 25, 2019
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Feb 23, 2023
Last updated
Dec 22, 2023
Violation Comments to GitLab Plugin stored API tokens unencrypted in job
config.xml
files and its global configuration fileorg.jenkinsci.plugins.jvctgl.ViolationsToGitLabGlobalConfiguration.xml
on the Jenkins controller. These credentials could be viewed by users with Extended Read permission, or access to the Jenkins controller file system.Violation Comments to GitLab Plugin now stores these credentials encrypted. Existing jobs need to have their configuration saved for existing plain text credentials to be overwritten.
References