cvelist/2021/21xxx/CVE-2021-21612.json
2021-01-13 16:01:59 +00:00

63 lines
2.0 KiB
JSON

{
"CVE_data_meta": {
"ID": "CVE-2021-21612",
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Jenkins project",
"product": {
"product_data": [
{
"product_name": "Jenkins TraceTronic ECU-TEST Plugin",
"version": {
"version_data": [
{
"version_value": "2.23.1",
"version_affected": "<="
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Jenkins TraceTronic ECU-TEST Plugin 2.23.1 and earlier stores credentials unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-256: Unprotected Storage of Credentials"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.jenkins.io/security/advisory/2021-01-13/#SECURITY-2057",
"url": "https://www.jenkins.io/security/advisory/2021-01-13/#SECURITY-2057",
"refsource": "CONFIRM"
}
]
}
}