Jenkins TraceTronic ECU-TEST Plugin 2.23.1 and earlier stores credentials unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
References
Link | Resource |
---|---|
https://www.jenkins.io/security/advisory/2021-01-13/#SECURITY-2057 | Vendor Advisory |
Configurations
History
19 Jan 2021, 16:59
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:jenkins:tracetronic_ecu-test:*:*:*:*:*:jenkins:*:* | |
References | (CONFIRM) https://www.jenkins.io/security/advisory/2021-01-13/#SECURITY-2057 - Vendor Advisory | |
CWE | CWE-522 | |
CVSS |
v2 : v3 : |
v2 : 2.1
v3 : 5.5 |
13 Jan 2021, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-01-13 16:15
Updated : 2023-12-10 13:41
NVD link : CVE-2021-21612
Mitre link : CVE-2021-21612
CVE.ORG link : CVE-2021-21612
JSON object : View
Products Affected
jenkins
- tracetronic_ecu-test
CWE
CWE-522
Insufficiently Protected Credentials