mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-30 18:04:30 +00:00
72 lines
2.5 KiB
JSON
72 lines
2.5 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2020-2274",
|
|
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Jenkins project",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Jenkins ElasTest Plugin",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "1.2.1",
|
|
"version_affected": "<="
|
|
},
|
|
{
|
|
"version_value": "1.2.1",
|
|
"version_affected": "?>"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Jenkins ElasTest Plugin 1.2.1 and earlier stores its server password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-312: Cleartext Storage of Sensitive Information"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-2014",
|
|
"url": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-2014",
|
|
"refsource": "CONFIRM"
|
|
},
|
|
{
|
|
"refsource": "MLIST",
|
|
"name": "[oss-security] 20200916 Multiple vulnerabilities in Jenkins plugins",
|
|
"url": "http://www.openwall.com/lists/oss-security/2020/09/16/3"
|
|
}
|
|
]
|
|
}
|
|
} |