← Volver a CVEs
CVE-2023-50772
MEDIUM4.3
Descripcion
Jenkins Dingding JSON Pusher Plugin 2.0 and earlier stores access tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
Detalles CVE
Puntuacion CVSS v3.14.3
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado12/13/2023
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
jenkins:dingding_json_pusher
Debilidades (CWE)
CWE-312
Referencias
http://www.openwall.com/lists/oss-security/2023/12/13/4(jenkinsci-cert@googlegroups.com)
https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3184(jenkinsci-cert@googlegroups.com)
http://www.openwall.com/lists/oss-security/2023/12/13/4(af854a3a-2127-422b-91ae-364da2661108)
https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3184(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.