Sensitive parameter values captured in build metadata files by Jenkins Parameterized Trigger Plugin
Low severity
GitHub Reviewed
Published
Mar 16, 2022
to the GitHub Advisory Database
•
Updated Dec 6, 2023
Package
Affected versions
< 2.43.1
Patched versions
2.43.1
Description
Published by the National Vulnerability Database
Mar 15, 2022
Published to the GitHub Advisory Database
Mar 16, 2022
Reviewed
Nov 30, 2022
Last updated
Dec 6, 2023
Jenkins Parameterized Trigger Plugin 2.43 and earlier captures environment variables passed to builds triggered using Jenkins Parameterized Trigger Plugin, including password parameter values, in their
build.xml
files. These values are stored unencrypted and can be viewed by users with access to the Jenkins controller file system.Existing
build.xml
files are not automatically updated to remove captured environment variables. They need to be manually cleaned up. To help with this, the plugin will report environment variables stored inbuild.xml
as unloadable data in the Old Data Monitor, that allows discarding this data. Build records are only loaded from disk when needed however, so some builds stored in Jenkins may not immediately appear there.References