CVE-2022-25180Cleartext Transmission of Sensitive Info in Project Jenkins Pipeline Groovy Plugin

Severity
4.3MEDIUMNVD
EPSS
0.0%
top 87.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 15
Latest updateFeb 16

Description

Jenkins Pipeline: Groovy Plugin 2648.va9433432b33c and earlier includes password parameters from the original build in replayed builds, allowing attackers with Run/Replay permission to obtain the values of password parameters passed to previous builds of a Pipeline.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages2 packages

CVEListV5jenkins_project/jenkins_pipeline_groovy_pluginunspecified2648.va9433432b33c
NVDjenkins/pipeline2648.va9433432b33c

Patches

🔴Vulnerability Details

3
OSV
Jenkins Pipeline: Groovy Plugin has Insufficiently Protected Credentials2022-02-16
GHSA
Jenkins Pipeline: Groovy Plugin has Insufficiently Protected Credentials2022-02-16
CVEList
CVE-2022-25180: Jenkins Pipeline: Groovy Plugin 26482022-02-15

📋Vendor Advisories

2
Jenkins
Jenkins Security Advisory 2022-02-152022-02-15
Red Hat
workflow-cps: Password parameters are included from the original build in replayed builds2022-02-15
CVE-2022-25180 — MEDIUM severity | cvebase