cvelist/2021/21xxx/CVE-2021-21612.json

63 lines
2.0 KiB
JSON
Raw Normal View History

2021-01-04 16:02:29 +00:00
{
"CVE_data_meta": {
"ID": "CVE-2021-21612",
2021-01-13 16:01:59 +00:00
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Jenkins project",
"product": {
"product_data": [
{
"product_name": "Jenkins TraceTronic ECU-TEST Plugin",
"version": {
"version_data": [
{
"version_value": "2.23.1",
"version_affected": "<="
}
]
}
}
]
}
}
]
}
2021-01-04 16:02:29 +00:00
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2021-01-04 16:02:29 +00:00
"description": {
"description_data": [
{
"lang": "eng",
"value": "Jenkins TraceTronic ECU-TEST Plugin 2.23.1 and earlier stores credentials unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-256: Unprotected Storage of Credentials"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.jenkins.io/security/advisory/2021-01-13/#SECURITY-2057",
"url": "https://www.jenkins.io/security/advisory/2021-01-13/#SECURITY-2057",
"refsource": "CONFIRM"
2021-01-04 16:02:29 +00:00
}
]
}
}