Lucene search

K
githubGitHub Advisory DatabaseGHSA-WJR6-V4C7-8CV6
HistoryDec 13, 2023 - 6:31 p.m.

Tokens stored in plain text by Dingding JSON Pusher Plugin

2023-12-1318:31:04
CWE-312
GitHub Advisory Database
github.com
9
dingding json pusher
access tokens
unencrypted storage
job config.xml
jenkins controller
item/extended read permission
file system access

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

AI Score

6.9

Confidence

High

EPSS

0

Percentile

13.3%

Jenkins Dingding JSON Pusher Plugin 2.0 and earlier stores access tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.

Affected configurations

Vulners
Node
com.zintowdingding-json-pusherRange2.0
VendorProductVersionCPE
com.zintowdingding-json-pusher*cpe:2.3:a:com.zintow:dingding-json-pusher:*:*:*:*:*:*:*:*

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

AI Score

6.9

Confidence

High

EPSS

0

Percentile

13.3%

Related for GHSA-WJR6-V4C7-8CV6