Jenkins Inedo BuildMaster Plugin showed plain text password in configuration form
Low severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Oct 26, 2023
Description
Published by the National Vulnerability Database
Sep 25, 2019
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Oct 26, 2023
Last updated
Oct 26, 2023
Jenkins Inedo BuildMaster Plugin Plugin stores a service password in its global Jenkins configuration.
While the password is stored encrypted on disk, it was transmitted in plain text as part of the configuration form. This could result in exposure of the password through browser extensions, cross-site scripting vulnerabilities, and similar situations.
Inedo BuildMaster Plugin Plugin now encrypts the password transmitted to administrators viewing the global configuration form.
References