#VU29523 Cleartext storage of sensitive information in White Source - CVE-2020-2213

 

#VU29523 Cleartext storage of sensitive information in White Source - CVE-2020-2213

Published: July 3, 2020 / Updated: October 12, 2020


Vulnerability identifier: #VU29523
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/U:Green
CVE-ID: CVE-2020-2213
CWE-ID: CWE-312
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
White Source
Software vendor:
Jenkins

Description

The vulnerability allows a remote user to view the password on the target system.

The vulnerability exists due to the affected software stores credentials in plain text as part of its global configuration file "org.whitesource.jenkins.pipeline.WhiteSourcePipelineStep.xml" and job "config.xml" files on the Jenkins master. A remote user with Extended Read permission (in the case of job config.xml files) or access to the master file system can obtain credentials.


Remediation

Install update from vendor's website.

External links