
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-38663 is a security vulnerability discovered in the Jenkins Git Plugin that affects versions 4.11.4 and earlier. The vulnerability was disclosed on August 23, 2022, and relates to improper credential masking in the Git Plugin's build log functionality. The issue specifically affects the Git Username and Password (gitUsernamePassword) credentials binding feature (Jenkins Advisory).
The vulnerability is classified with a Medium severity CVSS score. The technical issue stems from the Git Plugin's improper implementation of credential masking, where usernames are incorrectly masked instead of passwords in cases when usernames are not set to be treated as secret. This implementation flaw affects the build log provided by the Git Username and Password (gitUsernamePassword) credentials binding (Jenkins Advisory).
The vulnerability could potentially expose sensitive password information in build logs, as the plugin fails to properly mask (replace with asterisks) credentials. This exposure could lead to unauthorized access to systems if the credentials are intercepted by malicious actors (Jenkins Advisory).
The vulnerability has been fixed in Git Plugin version 4.11.5. Users are advised to update to this version, which properly masks credentials in the build log provided by the Git Username and Password credentials binding. It's worth noting that as a side effect of the fix, usernames currently set to be not masked will lose their current (unintentional) masking (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."