CVE-2022-34213
Published on: Not Yet Published
Last Modified on: 06/23/2022 05:19:00 PM UTC
Certain versions of Jenkins Squash TM Publisher Squash4Jenkins Plugin from Jenkins Project contain the following vulnerability:
Jenkins Squash TM Publisher (Squash4Jenkins) Plugin 1.0.0 and earlier stores passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
- CVE-2022-34213 has been assigned by
[email protected] to track the vulnerability
- Affected Vendor/Software:
Jenkins project - Jenkins Squash TM Publisher (Squash4Jenkins) Plugin version <= 1.0.0
- Affected Vendor/Software:
Jenkins project - Jenkins Squash TM Publisher (Squash4Jenkins) Plugin version ?> 1.0.0
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Jenkins Security Advisory 2022-06-22 | www.jenkins.io text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Software
Vendor | Product | Version |
---|---|---|
Jenkins Project | Jenkins_Squash_TM_Publisher_Squash4Jenkins_Plugin | <= 1.0.0 |
Jenkins Project | Jenkins_Squash_TM_Publisher_Squash4Jenkins_Plugin | ?> 1.0.0 |
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2022-34213 : Jenkins Squash TM Publisher Squash4Jenkins Plugin 1.0.0 and earlier stores passwords unencrypted… twitter.com/i/web/status/1… | 2022-06-22 15:00:05 |
![]() |
Jenkins - CVE-2022-34213: jenkins.io/security/advis… | 2022-06-23 19:00:06 |
![]() |
*VULNERABILITY* CVE-2022-34213 CW.cyberwire.info/SSknqw #cybersecurity #vulnerability #cyberwire | 2022-06-23 23:06:09 |
![]() |
CVE-2022-34213 | 2022-06-22 15:38:32 |