CVE-2018-1000425: Jenkins SonarQube Scanner Plugin stored server authentication token in plain text
7.8
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.14067%
CWE
Published
5/13/2022
Updated
1/30/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.plugins:sonar | maven | <= 2.8 | 2.8.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper credential storage in SonarInstallation class. The advisory explicitly identifies SonarInstallation.java as the vulnerable component. In Jenkins plugin architecture:
- getServerAuthenticationToken() would be the direct accessor for the credential field
- configure() handles loading configuration state
- XStream serialization would persist these values to disk
While the exact patch code isn't shown, the credential storage pattern in Jenkins plugins typically involves:
- Plaintext fields in Domain Objects (SonarInstallation)
- getters exposing sensitive data
- configure() methods rebuilding state from config
These functions would appear in stack traces during:
- Configuration saves (persisting plaintext)
- Build steps accessing SonarQube credentials
- Configuration UIs displaying credential values