-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.plugins:consul-kv-builder | maven | <= 2.0.13 |
The vulnerability stems from two key failures: 1) Storing the ACL token unencrypted in GlobalConsulConfig.xml, which would be handled by setter/getter methods in the GlobalConsulConfig class. 2) Lack of input masking in configuration forms, which is controlled by Jelly view templates. These are fundamental aspects of Jenkins plugin configuration handling - setters/store methods for configuration properties and form field rendering mechanisms are standard points where encryption and masking would be implemented.