Lucene search

K
githubGitHub Advisory DatabaseGHSA-6R5W-JJR5-QVGR
HistoryDec 13, 2023 - 6:31 p.m.

Password stored in a recoverable format by Jenkins OpenId Connect Authentication Plugin

2023-12-1318:31:04
CWE-312
CWE-522
GitHub Advisory Database
github.com
16
jenkins
openid connect
authentication
plugin
password
recoverable
format
local user
anti-lockout
plain text
administrator
access
jenkins controller
file system

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

7 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

5.1%

Jenkins OpenId Connect Authentication Plugin 2.6 and earlier stores a password of a local user account used as an anti-lockout feature in a recoverable format, allowing attackers with access to the Jenkins controller file system to recover the plain text password of that account, likely gaining administrator access to Jenkins.

Affected configurations

Vulners
Node
trestleauthRange2.6
CPENameOperatorVersion
org.jenkins-ci.plugins:oic-authle2.6

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

7 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

5.1%

Related for GHSA-6R5W-JJR5-QVGR