
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-46685 affects the Jenkins Gitea Plugin versions 1.4.4 and earlier. The vulnerability was discovered by Asi Greenholts of Cider Security and was publicly disclosed on December 7, 2022. This security issue involves improper handling of Gitea personal access tokens in the plugin's implementation (Jenkins Advisory).
The vulnerability is classified with a CVSS v3.1 Base Score of 4.3 (MEDIUM) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N. The technical issue stems from the plugin's implementation of Gitea personal access tokens, which lacks proper credentials masking functionality (NVD).
The vulnerability can result in the exposure of Gitea personal access tokens in build logs, particularly when they are printed as part of repository URLs. This exposure of sensitive credentials could potentially lead to unauthorized access to Gitea repositories and resources (Jenkins Advisory).
The vulnerability has been fixed in Gitea Plugin version 1.4.5, which adds support for masking of Gitea personal access tokens. For administrators unable to update, the recommended workaround is to use SSH checkout instead of personal access tokens (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."