
Cloud Vulnerability DB
A community-led vulnerabilities database
The Jenkins Telegram Bot Plugin version 1.4.0 and earlier contains a security vulnerability identified as CVE-2024-34147. The vulnerability relates to the insecure storage of the Telegram Bot token, which is stored unencrypted in the global configuration file on the Jenkins controller. This vulnerability was discovered by Surya Dev Singh Rawal from Siemens-Healthineers Pvt Ltd and was publicly disclosed on May 2, 2024 (Jenkins Advisory).
The vulnerability specifically involves the storage of the Telegram Bot token in plaintext within the configuration file 'jenkinsci.plugins.telegrambot.TelegramBotGlobalConfiguration.xml' on the Jenkins controller. The severity of this vulnerability is rated as Low according to CVSS metrics, with a CVSS 3.1 base score of 4.3 (MEDIUM) and vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N (Jenkins Advisory, OSS Security).
The primary impact of this vulnerability is that users with access to the Jenkins controller file system can view the unencrypted Telegram Bot token. This exposure could potentially lead to unauthorized access to the Telegram Bot functionality and associated communications (Jenkins Advisory).
As of the advisory's publication date, there is no official fix available for this vulnerability in the Telegram Bot Plugin. Users should carefully control and monitor access to the Jenkins controller file system to minimize the risk (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."