CVE-2022-34801: Cleartext Storage of Sensitive Information in Jenkins Build Notifications Plugin
3.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.6257%
CWE
Published
7/1/2022
Updated
11/22/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| tools.devnull:build-notifications | maven | <= 1.5.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability explicitly involves cleartext storage in XML config files (PushoverNotifier.xml, SlackNotifier.xml, TelegramNotifier.xml) and transmission via configuration forms. In Jenkins plugin architecture, descriptor classes (DescriptorImpl) typically handle global configuration. The configure() method in these descriptors would be responsible for processing form submissions and persisting configurations, making them the logical points where cleartext handling occurs. The advisory's specific mention of three distinct token types with their corresponding XML files strongly indicates these three descriptor implementations as vulnerable entry points.