Vulnerability Description
Jenkins Email Extension Plugin 2.72 and 2.73 transmits and displays the SMTP password in plain text as part of the global Jenkins configuration form, potentially resulting in its exposure.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jenkins | Email Extension | 2.72 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2020/08/12/4Mailing ListThird Party Advisory
- https://jenkins.io/security/advisory/2020-08-12/#SECURITY-1975Vendor Advisory
- http://www.openwall.com/lists/oss-security/2020/08/12/4Mailing ListThird Party Advisory
- https://jenkins.io/security/advisory/2020-08-12/#SECURITY-1975Vendor Advisory
FAQ
What is CVE-2020-2232?
CVE-2020-2232 is a vulnerability with a CVSS score of 7.5 (HIGH). Jenkins Email Extension Plugin 2.72 and 2.73 transmits and displays the SMTP password in plain text as part of the global Jenkins configuration form, potentially resulting in its exposure.
How severe is CVE-2020-2232?
CVE-2020-2232 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-2232?
Check the references section above for vendor advisories and patch information. Affected products include: Jenkins Email Extension.