cvelist/2022/34xxx/CVE-2022-34802.json

67 lines
2.3 KiB
JSON
Raw Normal View History

2022-06-29 18:00:50 +00:00
{
"CVE_data_meta": {
"ID": "CVE-2022-34802",
2022-06-30 18:00:49 +00:00
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Jenkins project",
"product": {
"product_data": [
{
"product_name": "Jenkins RocketChat Notifier Plugin",
"version": {
"version_data": [
{
"version_value": "1.5.2",
"version_affected": "<="
},
{
"version_value": "1.5.2",
"version_affected": "?>"
}
]
}
}
]
}
}
]
}
2022-06-29 18:00:50 +00:00
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2022-06-29 18:00:50 +00:00
"description": {
"description_data": [
{
"lang": "eng",
"value": "Jenkins RocketChat Notifier Plugin 1.5.2 and earlier stores the login password and webhook token unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-256: Plaintext Storage of a Password"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2088",
"url": "https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2088",
"refsource": "CONFIRM"
2022-06-29 18:00:50 +00:00
}
]
}
}