CVE-2014-2061: Jenkin allows attackers to obtain passwords by reading the HTML source code
5
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.43565%
CWE
-
Published
5/17/2022
Updated
3/5/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
AV:N/AC:L/Au:N/C:P/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.main:jenkins-core | maven | >= 1.533, < 1.551 | 1.551 |
org.jenkins-ci.main:jenkins-core | maven | < 1.532.2 | 1.532.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from PasswordParameterDefinition
's getDefaultValue()
returning a plaintext password string. The associated Jelly template (config.jelly
) used this value in a password field's 'value' attribute, exposing it in HTML source. The patch introduced getDefaultValueAsSecret()
to return an encrypted Secret instead, and updated the template to use it. The pre-patch getDefaultValue()
was the direct source of plaintext exposure.