Unencrypted Storage of Access Tokens in Jenkins Dingding JSON Pusher Plugin

Unencrypted Storage of Access Tokens in Jenkins Dingding JSON Pusher Plugin

CVE-2023-50772 · MEDIUM Severity

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Jenkins Dingding JSON Pusher Plugin 2.0 and earlier stores access tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.

Learn more about our User Device Pen Test.