An exposure of sensitive information vulnerability exists in Jenkins GitHub Pull Request Builder Plugin version 1.39.0 and older in GhprbCause.java that allows an attacker with local file system access to obtain GitHub credentials. Since 1.40.0, the plugin no longer stores serialized objects containing the credential on disk. Builds started before the plugin was updated to 1.40.0 will retain the encoded credentials on disk. We strongly recommend revoking old GitHub credentials used in Jenkins. We’re providing a script for use in the Script Console that will attempt to remove old stored credentials from build.xml files.
{ "nvd_published_at": "2018-04-05T13:29:00Z", "github_reviewed_at": "2022-12-12T21:06:35Z", "severity": "MODERATE", "github_reviewed": true, "cwe_ids": [ "CWE-200" ] }