
Cloud Vulnerability DB
A community-led vulnerabilities database
The Jenkins Build Notifications Plugin version 1.5.0 and earlier contains a security vulnerability identified as CVE-2022-34801. This vulnerability relates to the transmission of tokens in plain text as part of the global Jenkins configuration form. The issue was disclosed on June 30, 2022, affecting the Build Notifications Plugin's handling of sensitive authentication tokens (Jenkins Advisory).
The vulnerability specifically involves the transmission of multiple tokens in plain text format through the global configuration form. The affected tokens include the Pushover Application Token, Slack Bot Token, and Telegram Bot Token. This vulnerability is classified with a Low severity CVSS score (Jenkins Advisory).
The primary impact of this vulnerability is the potential exposure of sensitive authentication tokens during transmission. This could allow attackers who can intercept network traffic to capture these tokens, potentially leading to unauthorized access to the associated services (Pushover, Slack, and Telegram) (Jenkins Advisory).
As of the advisory's publication date, there was no fix available for this vulnerability in the Build Notifications Plugin. Users should consider implementing network-level security measures to protect the transmission of sensitive data and limit access to the Jenkins configuration interface (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."