Jenkins Build-Publisher plugin has Insufficiently Protected Credentials
High severity
GitHub Reviewed
Published
May 13, 2022
to the GitHub Advisory Database
•
Updated Jan 31, 2023
Package
Affected versions
<= 1.21
Patched versions
1.22
Description
Published by the National Vulnerability Database
Jan 26, 2018
Published to the GitHub Advisory Database
May 13, 2022
Reviewed
Dec 6, 2022
Last updated
Jan 31, 2023
Jenkins Build-Publisher plugin version 1.21 and earlier stores credentials to other Jenkins instances in the file
hudson.plugins.build_publisher.BuildPublisher.xml
in the Jenkins master home directory. These credentials were stored unencrypted, allowing anyone with local file system access to access them. Additionally, the credentials were also transmitted in plain text as part of the configuration form. This could result in exposure of the credentials through browser extensions, cross-site scripting vulnerabilities, and similar situations. Build-Publisher Plugin 1.22 encrypts the credentials on disk, and only transmits their encrypted form to users viewing the configuration form.References