Show filters
5 Total Results
Displaying 1-5 of 5
Sort by:
Attacker Value
Unknown

CVE-2022-20616

Disclosure Date: January 12, 2022 (last updated October 25, 2023)
Jenkins Credentials Binding Plugin 1.27 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read access to validate if a credential ID refers to a secret file credential and whether it's a zip file.
Attacker Value
Unknown

CVE-2020-2182

Disclosure Date: May 06, 2020 (last updated February 21, 2025)
Jenkins Credentials Binding Plugin 1.22 and earlier does not mask (i.e., replace with asterisks) secrets containing a `$` character in some circumstances.
Attacker Value
Unknown

CVE-2020-2181

Disclosure Date: May 06, 2020 (last updated February 21, 2025)
Jenkins Credentials Binding Plugin 1.22 and earlier does not mask (i.e., replace with asterisks) secrets in the build log when the build contains no build steps.
Attacker Value
Unknown

CVE-2019-1010241

Disclosure Date: July 19, 2019 (last updated November 27, 2024)
Jenkins Credentials Binding Plugin Jenkins 1.17 is affected by: CWE-257: Storing Passwords in a Recoverable Format. The impact is: Authenticated users can recover credentials. The component is: config-variables.jelly line #30 (passwordVariable). The attack vector is: Attacker creates and executes a Jenkins job.
Attacker Value
Unknown

CVE-2018-1000057

Disclosure Date: February 09, 2018 (last updated November 26, 2024)
Jenkins Credentials Binding Plugin 1.14 and earlier masks passwords it provides to build processes in their build logs. Jenkins however transforms provided password values, e.g. replacing environment variable references, which could result in values different from but similar to configured passwords being provided to the build. Those values are not subject to masking, and could allow unauthorized users to recover the original password.
0