CVE-2023-24454
Published on: Not Yet Published
Last Modified on: 02/02/2023 04:52:00 PM UTC
Certain versions of Testquality Updater from Jenkins contain the following vulnerability:
Jenkins TestQuality Updater Plugin 1.3 and earlier stores the TestQuality Updater password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
- CVE-2023-24454 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
- Affected Vendor/Software:
Jenkins Project - Jenkins TestQuality Updater Plugin version <= 1.3
- Affected Vendor/Software:
Jenkins Project - Jenkins TestQuality Updater Plugin version ?> 1.3
CVSS3 Score: 5.5 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
LOCAL | LOW | LOW | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | NONE | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Jenkins Security Advisory 2023-01-24 | www.jenkins.io text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Jenkins | Testquality Updater | All | All | All | All |
- cpe:2.3:a:jenkins:testquality_updater:*:*:*:*:*:jenkins:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2023-24454 : Jenkins TestQuality Updater Plugin 1.3 and earlier stores the TestQuality Updater password unencry… twitter.com/i/web/status/1… | 2023-01-26 22:21:04 |
![]() |
CVE-2023-24454 | 2023-01-26 23:38:46 |