Skip to content

Secret file credentials stored unencrypted in rare cases by Plain Credentials Plugin

Moderate severity GitHub Reviewed Published Jun 26, 2024 to the GitHub Advisory Database • Updated Jun 26, 2024

Package

maven org.jenkins-ci.plugins:plain-credentials (Maven)

Affected versions

< 183.va

Patched versions

183.va

Description

When creating secret file credentials Plain Credentials Plugin 182.v468b_97b_9dcb_8 and earlier attempts to decrypt the content of the file to check if it constitutes a valid encrypted secret. In rare cases the file content matches the expected format of an encrypted secret, and the file content will be stored unencrypted (only Base64 encoded) on the Jenkins controller file system.

These credentials can be viewed by users with access to the Jenkins controller file system (global credentials) or with Item/Extended Read permission (folder-scoped credentials).

Plain Credentials Plugin 183.va_de8f1dd5a_2b_ no longer attempts to decrypt the content of the file when creating secret file credentials.

References

Published by the National Vulnerability Database Jun 26, 2024
Published to the GitHub Advisory Database Jun 26, 2024
Last updated Jun 26, 2024
Reviewed Jun 26, 2024

Severity

Moderate
4.3
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Weaknesses

CVE ID

CVE-2024-39459

GHSA ID

GHSA-3cpq-rw36-cppv
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.