-
CVSS Score
-The vulnerability stems from unencrypted storage of credentials in jenkins.plugin.assembla.AssemblaProjectProperty.xml. In Jenkins plugins, configuration classes like AssemblaProjectProperty typically handle credential persistence through methods like configure() and setters. The advisory explicitly states credentials are stored unencrypted, indicating these functions lack proper encryption handling (e.g., not using Jenkins' Secret class). The file path and class name directly correlate with the vulnerable configuration file mentioned in the advisory.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:assembla | maven | <= 1.4 |
A Semantic Attack on Google Gemini - Read the Latest Research