Cleartext transmission of sensitive information in Jenkins SoapUI Pro Functional Testing plugin



Published: 2020-09-02 | Updated: 2020-10-02
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2020-2251
CWE-ID CWE-319
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
SoapUI Pro Functional Testing
Web applications / Modules and components for CMS

Vendor Jenkins

Security Bulletin

This security bulletin contains information about 1 vulnerabilities.

Updated 02.10.2020

Added fixed version.

1) Cleartext transmission of sensitive information

EUVDB-ID: #VU46222

Risk: Medium

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-2251

CWE-ID: CWE-319 - Cleartext Transmission of Sensitive Information

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to affected plugin stores project passwords in job "config.xml" files on the Jenkins controller as part of its configuration. A remote user with Extended Read permission can gain access to sensitive data.

Mitigation

Install update from vendor's website.

Vulnerable software versions

SoapUI Pro Functional Testing: 1.0 - 1.5

External links

http://www.openwall.com/lists/oss-security/2020/09/01/3
http://jenkins.io/security/advisory/2020-09-01/#SECURITY-1631%20(2)


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###