SB2020090212 - Cleartext storage of sensitive information in Jenkins SoapUI Pro Functional Testing plugin



SB2020090212 - Cleartext storage of sensitive information in Jenkins SoapUI Pro Functional Testing plugin

Published: September 2, 2020

Security Bulletin ID SB2020090212
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Cleartext storage of sensitive information (CVE-ID: CVE-2020-2250)

The vulnerability allows a remote user to gain access to sensitive information on the system.

The vulnerability exists due to the affected software stores project passwords unencrypted in job "config.xml" files. A remote user with Extended Read permission or access to the Jenkins controller file system can obtain this password.


Remediation

Install update from vendor's website.