{"api_version":"1","generated_at":"2026-04-23T09:53:06+00:00","cve":"CVE-2022-27206","urls":{"html":"https://cve.report/CVE-2022-27206","api":"https://cve.report/api/cve/CVE-2022-27206.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-27206","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-27206"},"summary":{"title":"CVE-2022-27206","description":"Jenkins GitLab Authentication Plugin 1.13 and earlier stores the GitLab client secret unencrypted in the global config.xml file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.","state":"PUBLIC","assigner":"jenkinsci-cert@googlegroups.com","published_at":"2022-03-15 17:15:00","updated_at":"2023-11-15 04:03:00"},"problem_types":["CWE-522"],"metrics":[],"references":[{"url":"https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-1891","name":"https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-1891","refsource":"CONFIRM","tags":[],"title":"Jenkins Security Advisory 2022-03-15","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2022/03/15/2","name":"[oss-security] 20220315 Multiple vulnerabilities in Jenkins plugins","refsource":"MLIST","tags":[],"title":"oss-security - Multiple vulnerabilities in Jenkins plugins","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-27206","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27206","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"27206","vulnerable":"1","versionEndIncluding":"1.13","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jenkins","cpe5":"gitlab_authentication","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"jenkins","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2022-27206","ASSIGNER":"jenkinsci-cert@googlegroups.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Jenkins GitLab Authentication Plugin 1.13 and earlier stores the GitLab client secret unencrypted in the global config.xml file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Jenkins project","product":{"product_data":[{"product_name":"Jenkins GitLab Authentication Plugin","version":{"version_data":[{"version_value":"not down converted","x_cve_json_5_version_data":{"versions":[{"lessThanOrEqual":"1.13","status":"affected","version":"unspecified","versionType":"custom"},{"lessThan":"unspecified","status":"unknown","version":"next of 1.13","versionType":"custom"}]}}]}}]}}]}},"references":{"reference_data":[{"url":"https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-1891","refsource":"MISC","name":"https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-1891"},{"url":"http://www.openwall.com/lists/oss-security/2022/03/15/2","refsource":"MISC","name":"http://www.openwall.com/lists/oss-security/2022/03/15/2"}]}},"nvd":{"publishedDate":"2022-03-15 17:15:00","lastModifiedDate":"2023-11-15 04:03:00","problem_types":["CWE-522"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:jenkins:gitlab_authentication:*:*:*:*:*:jenkins:*:*","versionEndIncluding":"1.13","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}