Unencrypted Password Storage in Jenkins Vmware vRealize CodeStream Plugin

Unencrypted Password Storage in Jenkins Vmware vRealize CodeStream Plugin

CVE-2022-27217 · MEDIUM Severity

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Jenkins Vmware vRealize CodeStream Plugin 1.2 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.

Learn more about our Cis Benchmark Audit For Vmware.