Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1xZ3c5LXZncmYtaDcyM84AAyuQ
Jenkins Report Portal Plugin allows users with Item/Extended Read permission to view tokens on Jenkins controller
Jenkins Report Portal Plugin 0.5 and earlier stores ReportPortal access tokens unencrypted in job config.xml
files on the Jenkins controller as part of its configuration.
These tokens can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
Additionally, the configuration form does not mask these tokens, increasing the potential for attackers to observe and capture them.
Permalink: https://github.com/advisories/GHSA-qgw9-vgrf-h723JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1xZ3c5LXZncmYtaDcyM84AAyuQ
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 6 months ago
Updated: 5 months ago
CVSS Score: 4.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Identifiers: GHSA-qgw9-vgrf-h723, CVE-2023-30523
References:
- https://nvd.nist.gov/vuln/detail/CVE-2023-30523
- https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2945
- http://www.openwall.com/lists/oss-security/2023/04/13/3
- https://github.com/advisories/GHSA-qgw9-vgrf-h723
Affected Packages
maven:org.jenkins-ci.plugins:reportportal
Versions: <= 0.5No known fixed version