← Volver a CVEs
CVE-2023-30523
MEDIUM4.3
Descripcion
Jenkins Report Portal Plugin 0.5 and earlier stores ReportPortal access tokens unencrypted in job config.xml files on the Jenkins controller as part of its configuration where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
Detalles CVE
Puntuacion CVSS v3.14.3
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado4/12/2023
Ultima modificacion2/7/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
jenkins:report_portal
Debilidades (CWE)
CWE-312CWE-311
Referencias
http://www.openwall.com/lists/oss-security/2023/04/13/3(jenkinsci-cert@googlegroups.com)
https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2945(jenkinsci-cert@googlegroups.com)
http://www.openwall.com/lists/oss-security/2023/04/13/3(af854a3a-2127-422b-91ae-364da2661108)
https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2945(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.