cvelist/2022/34xxx/CVE-2022-34808.json

66 lines
2.2 KiB
JSON
Raw Normal View History

2022-06-29 18:00:50 +00:00
{
"CVE_data_meta": {
"ID": "CVE-2022-34808",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Jenkins project",
"product": {
"product_data": [
{
"product_name": "Jenkins Cisco Spark Plugin",
"version": {
"version_data": [
{
"version_value": "1.1.1",
"version_affected": "<="
},
{
"version_value": "1.1.1",
"version_affected": "?>"
}
]
}
}
]
}
}
]
}
2022-06-29 18:00:50 +00:00
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2022-06-29 18:00:50 +00:00
"description": {
"description_data": [
{
"lang": "eng",
"value": "Jenkins Cisco Spark Plugin 1.1.1 and earlier stores bearer tokens unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-256: Plaintext Storage of a Password"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2055",
"url": "https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2055",
"refsource": "CONFIRM"
2022-06-29 18:00:50 +00:00
}
]
}
}