Information Exposure Affecting hudson.plugins.octopusdeploy:octopusdeploy package, versions [0,]


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Not Defined
EPSS
0.32% (71st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-HUDSONPLUGINSOCTOPUSDEPLOY-450012
  • published17 Jun 2019
  • disclosed3 Apr 2019
  • creditViktor Gazdag

Introduced: 3 Apr 2019

CVE-2019-1003071  (opens in a new tab)
CWE-255  (opens in a new tab)

How to fix?

There is no fixed version for hudson.plugins.octopusdeploy:octopusdeploy.

Overview

hudson.plugins.octopusdeploy:octopusdeploy helps connecting OctopusDeploy to the Jenkins workflow. Integration with OctopusDeploy is achieved via the REST API, not the Octo.exe tool.

Affected versions of this package are vulnerable to Information Exposure. The plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVSS Scores

version 3.1