Unencrypted Password Storage in Jenkins Applatix Plugin

Unencrypted Password Storage in Jenkins Applatix Plugin

CVE-2020-2133 · MEDIUM Severity

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Jenkins Applatix Plugin 1.1 and earlier stores a password unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system.

Learn more about our User Device Pen Test.