Sensitive Information Exposure in Jenkins Parameterized Trigger Plugin

Sensitive Information Exposure in Jenkins Parameterized Trigger Plugin

CVE-2022-27195 · MEDIUM Severity

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Jenkins Parameterized Trigger Plugin 2.43 and earlier captures environment variables passed to builds triggered using Jenkins Parameterized Trigger Plugin, including password parameter values, in their `build.xml` files. These values are stored unencrypted and can be viewed by users with access to the Jenkins controller file system.

Learn more about our User Device Pen Test.