Information Exposure Affecting org.jenkins-ci.plugins:soapui-pro-functional-testing package, versions [0,]


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (23rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGJENKINSCIPLUGINS-609353
  • published2 Sept 2020
  • disclosed2 Sept 2020
  • creditWasin Saengow

Introduced: 2 Sep 2020

CVE-2020-2251  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

There is no fixed version for org.jenkins-ci.plugins:soapui-pro-functional-testing.

Overview

org.jenkins-ci.plugins:soapui-pro-functional-testing is a plugin used to run SoapUI Pro tests from Jenkins builds.

Affected versions of this package are vulnerable to Information Exposure. It stores project passwords in job. While these passwords are stored encrypted on disk since SoapUI Pro Functional Testing Plugin 1.4, they are transmitted in plain text as part of the global configuration form by SoapUI Pro Functional Testing Plugin 1.5 and earlier. These passwords can be viewed by attackers with Extended Read permission. This only affects Jenkins before 2.236, including 2.235.x LTS, as Jenkins 2.236 introduces a security hardening that transparently encrypts and decrypts data used for a Jenkins password form field.

CVSS Scores

version 3.1