-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| com.cloudcoreo.plugins:cloudcoreo-deploytime | maven | <= 0.2.3 |
The vulnerability stems from credentials being stored unencrypted in a global XML configuration file. In Jenkins plugin architecture:
Though exact code isn't available, the file name and Jenkins plugin patterns strongly indicate these functions are involved in credential handling and storage. The high confidence comes from the explicit file path in advisories and consistency with Jenkins CWE-522 vulnerability patterns.
A Semantic Attack on Google Gemini - Read the Latest Research