-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:azure-ad | maven | <= 0.3.3 | 0.3.4 |
The vulnerability stemmed from unencrypted storage of client secrets in Jenkins' config.xml. The commit diff shows the critical change occurred in AzureSecurityRealm.java's XML marshaling logic, where client secret storage was modified from plaintext (getClientSecret()) to encrypted (getClientSecretSecret()). The ConverterImpl.marshal method was directly responsible for writing this sensitive data to persistent storage without encryption in vulnerable versions.
A Semantic Attack on Google Gemini - Read the Latest Research