CVE-2022-34806

Jenkins Jigomerge Plugin 0.9 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jenkins:jigomerge:*:*:*:*:*:jenkins:*:*

History

22 Nov 2023, 19:57

Type Values Removed Values Added
CWE CWE-522

25 Oct 2023, 18:17

Type Values Removed Values Added
CWE CWE-256

11 Jul 2022, 17:31

Type Values Removed Values Added
CPE cpe:2.3:a:jenkins:jigomerge:*:*:*:*:*:jenkins:*:*
First Time Jenkins jigomerge
Jenkins
CVSS v2 : unknown
v3 : unknown
v2 : 4.0
v3 : 6.5
References (CONFIRM) https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2083 - (CONFIRM) https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2083 - Vendor Advisory

30 Jun 2022, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-06-30 18:15

Updated : 2023-12-10 14:22


NVD link : CVE-2022-34806

Mitre link : CVE-2022-34806

CVE.ORG link : CVE-2022-34806


JSON object : View

Products Affected

jenkins

  • jigomerge
CWE
CWE-522

Insufficiently Protected Credentials