
Cloud Vulnerability DB
A community-led vulnerabilities database
Jenkins Bitbucket Branch Source Plugin version 886.v44cf5e4ecec5 and earlier contains a security vulnerability identified as CVE-2024-39460. The vulnerability was discovered and disclosed on June 26, 2024, affecting the plugin's handling of Bitbucket OAuth access tokens. The issue specifically impacts the Jenkins automation server's Bitbucket Branch Source Plugin, which is used for integration with Bitbucket repositories (Jenkins Advisory).
The vulnerability stems from the plugin's logging functionality where it exposes sensitive authentication information by printing the Bitbucket OAuth access token as part of the Bitbucket URL in the build log under certain conditions. The severity of this vulnerability is rated as Medium according to the CVSS scoring system (Jenkins Advisory, OSS Security).
The exposure of OAuth access tokens in build logs poses a significant security risk as these tokens could be used by malicious actors to gain unauthorized access to the associated Bitbucket resources. This could potentially lead to unauthorized repository access and compromise of source code integrity (Jenkins Advisory).
The vulnerability has been patched in Bitbucket Branch Source Plugin version 887.vad359b3d2d8d, which removes the OAuth access token from the Bitbucket URL in the build log. Users are strongly advised to upgrade to this version to address the security issue (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."