#VU45664 Cleartext storage of sensitive information in Email Extension - CVE-2020-2232

 

#VU45664 Cleartext storage of sensitive information in Email Extension - CVE-2020-2232

Published: August 13, 2020


Vulnerability identifier: #VU45664
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2020-2232
CWE-ID: CWE-312
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Email Extension
Software vendor:
Jenkins

Description

The vulnerability allows a remote attacker to view the password on the target system.

The vulnerability exists due to the affected software stores an SMTP password in its global configuration file "hudson.plugins.emailext.ExtendedEmailPublisher.xml" as part of its configuration. A remote attacker can obtain credentials.


Remediation

Install updates from vendor's website.

External links