AWS secrets displayed without masking by Jenkins S3 Explorer Plugin
Low severity
GitHub Reviewed
Published
Oct 19, 2022
to the GitHub Advisory Database
•
Updated Feb 1, 2023
Description
Published by the National Vulnerability Database
Oct 19, 2022
Published to the GitHub Advisory Database
Oct 19, 2022
Reviewed
Oct 19, 2022
Last updated
Feb 1, 2023
S3 Explorer Plugin stores AWS_SECRET_ACCESS_KEY in its global configuration file
s3explorer.xml
on the Jenkins controller as part of its configuration.While this secret is stored encrypted on disk, in S3 Explorer Plugin 1.0.8 and earlier the global configuration form does not mask the AWS_SECRET_ACCESS_KEY form field, increasing the potential for attackers to observe and capture it.
References