CVE-2023-30523

Jenkins Report Portal Plugin 0.5 and earlier stores ReportPortal access tokens unencrypted in job config.xml files on the Jenkins controller as part of its configuration where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jenkins:report_portal:*:*:*:*:*:jenkins:*:*

History

20 Apr 2023, 20:06

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.3
CWE CWE-312
References (MISC) https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2945 - (MISC) https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2945 - Vendor Advisory
References (MISC) http://www.openwall.com/lists/oss-security/2023/04/13/3 - (MISC) http://www.openwall.com/lists/oss-security/2023/04/13/3 - Mailing List, Third Party Advisory
First Time Jenkins
Jenkins report Portal
CPE cpe:2.3:a:jenkins:report_portal:*:*:*:*:*:jenkins:*:*

13 Apr 2023, 21:15

Type Values Removed Values Added
References
  • (MISC) http://www.openwall.com/lists/oss-security/2023/04/13/3 -

12 Apr 2023, 19:08

Type Values Removed Values Added
New CVE

Information

Published : 2023-04-12 18:15

Updated : 2023-12-10 15:01


NVD link : CVE-2023-30523

Mitre link : CVE-2023-30523

CVE.ORG link : CVE-2023-30523


JSON object : View

Products Affected

jenkins

  • report_portal
CWE
CWE-312

Cleartext Storage of Sensitive Information