CVE-2024-39459

In rare cases Jenkins Plain Credentials Plugin 182.v468b_97b_9dcb_8 and earlier stores secret file credentials unencrypted (only Base64 encoded) on the Jenkins controller file system, where they can be viewed by users with access to the Jenkins controller file system (global credentials) or with Item/Extended Read permission (folder-scoped credentials).
Configurations

Configuration 1 (hide)

cpe:2.3:a:jenkins:plain_credentials:*:*:*:*:*:jenkins:*:*

History

10 Oct 2025, 15:26

Type Values Removed Values Added
CPE cpe:2.3:a:jenkins:plain_credentials:*:*:*:*:*:jenkins:*:*
First Time Jenkins plain Credentials
Jenkins
References () http://www.openwall.com/lists/oss-security/2024/06/26/2 - () http://www.openwall.com/lists/oss-security/2024/06/26/2 - Mailing List
References () https://www.jenkins.io/security/advisory/2024-06-26/#SECURITY-2495 - () https://www.jenkins.io/security/advisory/2024-06-26/#SECURITY-2495 - Vendor Advisory

Information

Published : 2024-06-26 17:15

Updated : 2025-10-10 15:26


NVD link : CVE-2024-39459

Mitre link : CVE-2024-39459

CVE.ORG link : CVE-2024-39459


JSON object : View

Products Affected

jenkins

  • plain_credentials
CWE
CWE-922

Insecure Storage of Sensitive Information