
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2020-2126 affects the Jenkins DigitalOcean Plugin versions 1.1 and earlier. The vulnerability was disclosed on February 12, 2020, and involves the insecure storage of authentication tokens in the plugin's configuration files (Jenkins Advisory, NVD).
The vulnerability is classified as Low severity with a CVSS v3.1 base score of 4.3 MEDIUM (Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N). The issue stems from the plugin storing authentication tokens unencrypted in the global config.xml files as part of its configuration (Jenkins Advisory).
The vulnerability exposes authentication tokens to users who have access to the Jenkins controller file system. This could potentially lead to unauthorized access to DigitalOcean resources if the exposed tokens are compromised (Jenkins Advisory).
As of the advisory publication date, no fix was available for this vulnerability. Users should carefully control access to the Jenkins controller file system to minimize the risk of token exposure (Jenkins Advisory).
The vulnerability was discovered and reported by James Holderness of IB Boost, along with several other security issues in Jenkins plugins (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."