Rapid7 Vulnerability & Exploit Database

Jenkins Advisory 2022-09-21: CVE-2022-41255: API token stored in plain text by CONS3RT Plugin

Back to Search

Jenkins Advisory 2022-09-21: CVE-2022-41255: API token stored in plain text by CONS3RT Plugin

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
09/22/2022
Created
09/23/2022
Added
09/22/2022
Modified
09/26/2022

Description

Jenkins CONS3RT Plugin 1.0.0 and earlier stores Cons3rt API token unencrypted in job config.xml files on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.

Solution(s)

  • jenkins-upgrade-2_370

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;