CVE-2020-2209: Password stored in plain text by Jenkins TestComplete support Plugin
4.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.07093%
CWE
Published
5/24/2022
Updated
10/26/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.plugins:TestComplete | maven | < 2.5.2 | 2.5.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from plaintext password storage in job config.xml
files. The patch (commit 0098887) explicitly clears userName
/userPassword
fields when credentialsId
is used, indicating these fields were the storage mechanism. The getUserPassword()
method's use of Secret.getPlainText()
and prepareServiceCommandLine
's credential handling would directly expose the password. The newInstance
method's modification to clear plaintext fields confirms these were the vulnerable entry points.