CVE Vulnerabilities

CVE-2022-25180

Cleartext Transmission of Sensitive Information

Published: Feb 15, 2022 | Modified: Nov 21, 2024
CVSS 3.x
4.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS 2.x
4 MEDIUM
AV:N/AC:L/Au:S/C:P/I:N/A:N
RedHat/V2
RedHat/V3
4.3 MODERATE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Ubuntu
root.io logo minimus.io logo echo.ai logo

Jenkins Pipeline: Groovy Plugin 2648.va9433432b33c and earlier includes password parameters from the original build in replayed builds, allowing attackers with Run/Replay permission to obtain the values of password parameters passed to previous builds of a Pipeline.

Weakness

The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.

Affected Software

NameVendorStart VersionEnd Version
Pipeline:_groovyJenkins*2648.va9433432b33c (including)
Red Hat OpenShift Container Platform 3.11RedHatjenkins-2-plugins-0:3.11.1650371376-1.el7*
Red Hat OpenShift Container Platform 4.10RedHatjenkins-2-plugins-0:4.10.1647505461-1.el8*
Red Hat OpenShift Container Platform 4.6RedHatjenkins-2-plugins-0:4.6.1650364520-1.el8*
Red Hat OpenShift Container Platform 4.7RedHatjenkins-2-plugins-0:4.7.1648800585-1.el8*
Red Hat OpenShift Container Platform 4.8RedHatjenkins-2-plugins-0:4.8.1646993358-1.el8*
Red Hat OpenShift Container Platform 4.9RedHatjenkins-2-plugins-0:4.9.1647580879-1.el8*

Potential Mitigations

References