Jenkins Credentials Binding
By the Year
In 2023 there have been 0 vulnerabilities in Jenkins Credentials Binding . Last year Credentials Binding had 1 security vulnerability published. Right now, Credentials Binding is on track to have less security vulnerabilities in 2023 than it did last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2023 | 0 | 0.00 |
2022 | 1 | 4.30 |
2021 | 0 | 0.00 |
2020 | 2 | 5.40 |
2019 | 1 | 6.50 |
2018 | 1 | 4.30 |
It may take a day or so for new Credentials Binding vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Jenkins Credentials Binding Security Vulnerabilities
Jenkins Credentials Binding Plugin 1.27 and earlier does not perform a permission check in a method implementing form validation
CVE-2022-20616
4.3 - Medium
- January 12, 2022
Jenkins Credentials Binding Plugin 1.27 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read access to validate if a credential ID refers to a secret file credential and whether it's a zip file.
AuthZ
Jenkins Credentials Binding Plugin 1.22 and earlier does not mask (i.e
CVE-2020-2181
6.5 - Medium
- May 06, 2020
Jenkins Credentials Binding Plugin 1.22 and earlier does not mask (i.e., replace with asterisks) secrets in the build log when the build contains no build steps.
Insufficiently Protected Credentials
Jenkins Credentials Binding Plugin 1.22 and earlier does not mask (i.e
CVE-2020-2182
4.3 - Medium
- May 06, 2020
Jenkins Credentials Binding Plugin 1.22 and earlier does not mask (i.e., replace with asterisks) secrets containing a `$` character in some circumstances.
Insufficiently Protected Credentials
Jenkins Credentials Binding Plugin Jenkins 1.17 is affected by: CWE-257: Storing Passwords in a Recoverable Format
CVE-2019-1010241
6.5 - Medium
- July 19, 2019
Jenkins Credentials Binding Plugin Jenkins 1.17 is affected by: CWE-257: Storing Passwords in a Recoverable Format. The impact is: Authenticated users can recover credentials. The component is: config-variables.jelly line #30 (passwordVariable). The attack vector is: Attacker creates and executes a Jenkins job.
Credentials Management Errors
Jenkins Credentials Binding Plugin 1.14 and earlier masks passwords it provides to build processes in their build logs
CVE-2018-1000057
4.3 - Medium
- February 09, 2018
Jenkins Credentials Binding Plugin 1.14 and earlier masks passwords it provides to build processes in their build logs. Jenkins however transforms provided password values, e.g. replacing environment variable references, which could result in values different from but similar to configured passwords being provided to the build. Those values are not subject to masking, and could allow unauthorized users to recover the original password.
Insufficiently Protected Credentials
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Jenkins Credentials Binding or by Jenkins? Click the Watch button to subscribe.
