Unencrypted Storage of Private Keys in Jenkins Google Compute Engine Plugin

Unencrypted Storage of Private Keys in Jenkins Google Compute Engine Plugin

CVE-2022-29052 · MEDIUM Severity

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Jenkins Google Compute Engine Plugin 4.3.8 and earlier stores private keys unencrypted in cloud agent config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.

Learn more about our Cloud Audit.