CVE-2024-34147
Java vulnerability analysis and mitigation

Overview

The Jenkins Telegram Bot Plugin version 1.4.0 and earlier contains a security vulnerability identified as CVE-2024-34147. The vulnerability relates to the insecure storage of the Telegram Bot token, which is stored unencrypted in the global configuration file on the Jenkins controller. This vulnerability was discovered by Surya Dev Singh Rawal from Siemens-Healthineers Pvt Ltd and was publicly disclosed on May 2, 2024 (Jenkins Advisory).

Technical details

The vulnerability specifically involves the storage of the Telegram Bot token in plaintext within the configuration file 'jenkinsci.plugins.telegrambot.TelegramBotGlobalConfiguration.xml' on the Jenkins controller. The severity of this vulnerability is rated as Low according to CVSS metrics, with a CVSS 3.1 base score of 4.3 (MEDIUM) and vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N (Jenkins Advisory, OSS Security).

Impact

The primary impact of this vulnerability is that users with access to the Jenkins controller file system can view the unencrypted Telegram Bot token. This exposure could potentially lead to unauthorized access to the Telegram Bot functionality and associated communications (Jenkins Advisory).

Mitigation and workarounds

As of the advisory's publication date, there is no official fix available for this vulnerability in the Telegram Bot Plugin. Users should carefully control and monitor access to the Jenkins controller file system to minimize the risk (Jenkins Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management