Information Exposure Affecting org.jenkins-ci.plugins:azure-keyvault package, versions [0,]


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.17% (55th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGJENKINSCIPLUGINS-5422065
  • published13 Apr 2023
  • disclosed12 Apr 2023
  • creditUnknown

Introduced: 12 Apr 2023

CVE-2023-30514  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

Affected versions of this package are vulnerable to Information Exposure. Jenkins Azure Key Vault Plugin does not properly mask credentials (i.e., replace with asterisks) credentials printed in the build log from Pipeline steps like sh and bat, when both of the following conditions are met:

  1. The credentials are printed in build steps executing on an agent (typically inside a node block).

  2. Push mode for durable task logging is enabled.

CVSS Scores

version 3.1