Description
Jenkins Dingding JSON Pusher Plugin 2.0 and earlier stores access tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
Published: 2023-12-13
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-wjr6-v4c7-8cv6 Tokens stored in plain text by Dingding JSON Pusher Plugin
History

Mon, 02 Dec 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Jenkins Dingding Json Pusher
cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2025-02-13T17:19:35.969Z

Reserved: 2023-12-13T13:06:36.477Z

Link: CVE-2023-50772

cve-icon Vulnrichment

Updated: 2024-08-02T22:23:42.989Z

cve-icon NVD

Status : Modified

Published: 2023-12-13T18:15:44.137

Modified: 2024-11-21T08:37:17.080

Link: CVE-2023-50772

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses