Cleartext storage of sensitive information in Proxmox - CVE-2022-28141

 

Cleartext storage of sensitive information in Proxmox - CVE-2022-28141

Published: March 31, 2022


Vulnerability identifier: #VU61747
CSH Severity: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2022-28141
CWE-ID: CWE-312
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
Proxmox
Software vendor:
Jenkins

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to the affected plugin stores the Proxmox Datacenter password unencrypted in the global config.xml file on the Jenkins controller as part of its configuration. A local user can retrieve sensitive information stored in cleartext.


Remediation

Install updates from vendor's website.

External links