GHSA-jg29-c2qj-wpm3

Suggest an improvement
Source
https://github.com/advisories/GHSA-jg29-c2qj-wpm3
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-jg29-c2qj-wpm3/GHSA-jg29-c2qj-wpm3.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-jg29-c2qj-wpm3
Aliases
Published
2022-05-24T17:01:40Z
Modified
2023-11-01T04:50:37.160Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
Jenkins Anchore Container Scanner Plugin vulnerable to Insufficiently Protected Credentials
Details

Jenkins Anchore Container Image Scanner Plugin 1.0.19 and earlier stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

The credential being stored was a service password for the Anchore.io service. As the affected functionality has been deprecated, and the affected Anchore.io service has been shut down in late 2018, the affected feature has been removed.

Database specific
{
    "nvd_published_at": "2019-11-21T15:15:00Z",
    "github_reviewed_at": "2022-12-06T21:58:14Z",
    "severity": "MODERATE",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-522"
    ]
}
References

Affected packages

Maven / org.jenkins-ci.plugins:anchore-container-scanner

Package

Name
org.jenkins-ci.plugins:anchore-container-scanner
View open source insights on deps.dev
Purl
pkg:maven/org.jenkins-ci.plugins/anchore-container-scanner

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.20