cvelist/2020/2xxx/CVE-2020-2095.json
2020-01-15 19:01:34 +00:00

63 lines
2.1 KiB
JSON

{
"CVE_data_meta": {
"ID": "CVE-2020-2095",
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Jenkins project",
"product": {
"product_data": [
{
"product_name": "Jenkins Redgate SQL Change Automation Plugin",
"version": {
"version_data": [
{
"version_value": "2.0.4",
"version_affected": "<="
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Jenkins Redgate SQL Change Automation Plugin 2.0.4 and earlier stored an API key unencrypted in job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-256: Unprotected Storage of Credentials"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://jenkins.io/security/advisory/2020-01-15/#SECURITY-1696",
"url": "https://jenkins.io/security/advisory/2020-01-15/#SECURITY-1696",
"refsource": "CONFIRM"
}
]
}
}