Information Exposure Affecting hudson.plugins.octopusdeploy:octopusdeploy Open this link in a new tab package, versions [0,]


0.0
low
  • Attack Complexity

    Low

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-JAVA-HUDSONPLUGINSOCTOPUSDEPLOY-450012

  • published

    17 Jun 2019

  • disclosed

    3 Apr 2019

  • credit

    Viktor Gazdag

How to fix?

There is no fixed version for hudson.plugins.octopusdeploy:octopusdeploy.

Overview

hudson.plugins.octopusdeploy:octopusdeploy helps connecting OctopusDeploy to the Jenkins workflow. Integration with OctopusDeploy is achieved via the REST API, not the Octo.exe tool.

Affected versions of this package are vulnerable to Information Exposure. The plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.