CVE-2021-21612

Jenkins TraceTronic ECU-TEST Plugin 2.23.1 and earlier stores credentials unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jenkins:tracetronic_ecu-test:*:*:*:*:*:jenkins:*:*

History

19 Jan 2021, 16:59

Type Values Removed Values Added
CPE cpe:2.3:a:jenkins:tracetronic_ecu-test:*:*:*:*:*:jenkins:*:*
References (CONFIRM) https://www.jenkins.io/security/advisory/2021-01-13/#SECURITY-2057 - (CONFIRM) https://www.jenkins.io/security/advisory/2021-01-13/#SECURITY-2057 - Vendor Advisory
CWE CWE-522
CVSS v2 : unknown
v3 : unknown
v2 : 2.1
v3 : 5.5

13 Jan 2021, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-01-13 16:15

Updated : 2023-12-10 13:41


NVD link : CVE-2021-21612

Mitre link : CVE-2021-21612

CVE.ORG link : CVE-2021-21612


JSON object : View

Products Affected

jenkins

  • tracetronic_ecu-test
CWE
CWE-522

Insufficiently Protected Credentials