cvelist/2020/2xxx/CVE-2020-2250.json

68 lines
2.3 KiB
JSON
Raw Normal View History

2019-12-05 01:01:57 +00:00
{
"CVE_data_meta": {
"ID": "CVE-2020-2250",
2020-09-01 14:01:39 +00:00
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Jenkins project",
"product": {
"product_data": [
{
"product_name": "Jenkins SoapUI Pro Functional Testing Plugin",
"version": {
"version_data": [
{
"version_value": "1.3",
"version_affected": "<="
}
]
}
}
]
}
}
]
}
2019-12-05 01:01:57 +00:00
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2019-12-05 01:01:57 +00:00
"description": {
"description_data": [
{
"lang": "eng",
"value": "Jenkins SoapUI Pro Functional Testing Plugin 1.3 and earlier stores project passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by attackers with Extended Read permission, or access to the Jenkins controller file system."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-256: Unprotected Storage of Credentials"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://jenkins.io/security/advisory/2020-09-01/#SECURITY-1631%20(1)",
"url": "https://jenkins.io/security/advisory/2020-09-01/#SECURITY-1631%20(1)",
"refsource": "CONFIRM"
2020-09-01 18:01:38 +00:00
},
{
"refsource": "MLIST",
"name": "[oss-security] 20200901 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2020/09/01/3"
2019-12-05 01:01:57 +00:00
}
]
}
}