← Voltar para CVEs
CVE-2023-50772
MEDIUM4.3
Descricao
Jenkins Dingding JSON Pusher Plugin 2.0 and earlier stores access tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
Detalhes CVE
Pontuacao CVSS v3.14.3
SeveridadeMEDIUM
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosLOW
Interacao do usuarioNONE
Publicado12/13/2023
Ultima modificacao11/21/2024
Fontenvd
Avistamentos honeypot0
Produtos afetados
jenkins:dingding_json_pusher
Fraquezas (CWE)
CWE-312
Referencias
http://www.openwall.com/lists/oss-security/2023/12/13/4(jenkinsci-cert@googlegroups.com)
https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3184(jenkinsci-cert@googlegroups.com)
http://www.openwall.com/lists/oss-security/2023/12/13/4(af854a3a-2127-422b-91ae-364da2661108)
https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3184(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.