cvelist/2020/2xxx/CVE-2020-2297.json

72 lines
2.5 KiB
JSON
Raw Normal View History

2019-12-05 01:02:16 +00:00
{
"CVE_data_meta": {
"ID": "CVE-2020-2297",
2020-10-08 13:01:49 +00:00
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Jenkins project",
"product": {
"product_data": [
{
"product_name": "Jenkins SMS Notification Plugin",
"version": {
"version_data": [
{
"version_value": "1.2",
"version_affected": "<="
},
{
"version_value": "1.2",
"version_affected": "?>"
}
]
}
}
]
}
}
]
}
2019-12-05 01:02:16 +00:00
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2019-12-05 01:02:16 +00:00
"description": {
"description_data": [
{
"lang": "eng",
"value": "Jenkins SMS Notification Plugin 1.2 and earlier stores an access token unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-256: Unprotected Storage of Credentials"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-2054",
"url": "https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-2054",
"refsource": "CONFIRM"
2020-10-08 15:01:51 +00:00
},
{
"refsource": "MLIST",
"name": "[oss-security] 20201008 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2020/10/08/5"
2019-12-05 01:02:16 +00:00
}
]
}
}