SB20210120111 - Cleartext storage of sensitive information in jenkins (Alpine package)
Published: January 20, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Cleartext storage of sensitive information (CVE-ID: CVE-2021-21612)
The vulnerability allows a local user to view the password on the target system.
The vulnerability exists due to the affected software stores credentials unencrypted in its global configuration file "de.tracetronic.jenkins.plugins.ecutest.report.atx.installation.ATXInstallation.xml" on the Jenkins controller. A local user with access to the Jenkins controller file system can obtain credentials.
Remediation
Install update from vendor's website.