Vulnerability Description
Jenkins Artifactory Plugin 3.6.0 and earlier transmits configured passwords in plain text as part of its global Jenkins configuration form, potentially resulting in their exposure.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jfrog | Artifactory | <= 3.6.0 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2020/03/25/2Mailing ListThird Party Advisory
- https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1542%20%282%29
- http://www.openwall.com/lists/oss-security/2020/03/25/2Mailing ListThird Party Advisory
- https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1542%20%282%29
FAQ
What is CVE-2020-2165?
CVE-2020-2165 is a vulnerability with a CVSS score of 7.5 (HIGH). Jenkins Artifactory Plugin 3.6.0 and earlier transmits configured passwords in plain text as part of its global Jenkins configuration form, potentially resulting in their exposure.
How severe is CVE-2020-2165?
CVE-2020-2165 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-2165?
Check the references section above for vendor advisories and patch information. Affected products include: Jfrog Artifactory.