SB2020101210 - Cleartext storage of sensitive information in Jenkins couchdb-statistics plugin



SB2020101210 - Cleartext storage of sensitive information in Jenkins couchdb-statistics plugin

Published: October 12, 2020

Security Bulletin ID SB2020101210
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Local access
Highest impact Information disclosure

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Cleartext storage of sensitive information (CVE-ID: CVE-2020-2291)

The vulnerability allows a local user to view the password on the target system.

The vulnerability exists due to the affected software stores its server password unencrypted in its global configuration file "org.jenkinsci.plugins.couchstats.CouchStatsConfig.xml" on the Jenkins controller as part of its configuration. A local user with access to the Jenkins controller file system can obtain credentials.


Remediation

Install update from vendor's website.