cvelist/2020/2xxx/CVE-2020-2164.json

62 lines
2.0 KiB
JSON
Raw Normal View History

2019-12-05 01:01:19 +00:00
{
"CVE_data_meta": {
"ID": "CVE-2020-2164",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Jenkins project",
"product": {
"product_data": [
{
"product_name": "Jenkins Artifactory Plugin",
"version": {
"version_data": [
{
"version_value": "3.5.0",
"version_affected": "<="
}
]
}
}
]
}
}
]
}
2019-12-05 01:01:19 +00:00
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2019-12-05 01:01:19 +00:00
"description": {
"description_data": [
{
"lang": "eng",
"value": "Jenkins Artifactory Plugin 3.5.0 and earlier stores its Artifactory server password unencrypted in its global configuration file on the Jenkins master where it can be viewed by users with access to the master file system."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-312: Cleartext Storage of Sensitive Information"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1542%20(1)",
"url": "https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1542%20(1)",
"refsource": "CONFIRM"
2019-12-05 01:01:19 +00:00
}
]
}
}