CVE-2022-36901

Jenkins HTTP Request Plugin 1.15 and earlier stores HTTP Request passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jenkins:http_request:*:*:*:*:*:jenkins:*:*

History

02 Nov 2023, 21:06

Type Values Removed Values Added
CWE CWE-668 CWE-522

03 Aug 2022, 19:00

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
CPE cpe:2.3:a:jenkins:http_request:*:*:*:*:*:jenkins:*:*
First Time Jenkins
Jenkins http Request
References (MLIST) http://www.openwall.com/lists/oss-security/2022/07/27/1 - (MLIST) http://www.openwall.com/lists/oss-security/2022/07/27/1 - Mailing List, Third Party Advisory
References (CONFIRM) https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2053 - (CONFIRM) https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2053 - Vendor Advisory
CWE CWE-256 CWE-668

27 Jul 2022, 18:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2022/07/27/1 -

27 Jul 2022, 15:57

Type Values Removed Values Added
New CVE

Information

Published : 2022-07-27 15:15

Updated : 2023-12-10 14:35


NVD link : CVE-2022-36901

Mitre link : CVE-2022-36901

CVE.ORG link : CVE-2022-36901


JSON object : View

Products Affected

jenkins

  • http_request
CWE
CWE-522

Insufficiently Protected Credentials