CVE-2022-27217:
Passwords stored in plain text by Jenkins Vmware vRealize CodeStream Plugin
4.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.66876%
CWE
Published
3/16/2022
Updated
2/2/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
com.vmware.vcac:vmware-vrealize-codestream | maven | <= 1.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from unencrypted password storage in job config.xml files. Jenkins plugins typically serialize configuration data through XStream or similar mechanisms. The pattern indicates: 1) Password fields are stored as plain text strings rather than using Jenkins' Secret class 2) Data binding in configuration forms doesn't employ credential masking 3) No encryption is applied during XML serialization/deserialization. While exact code isn't available, the structure aligns with common Jenkins plugin credential handling flaws where sensitive fields aren't wrapped in Secret objects or encrypted before persistence.