In rare cases Jenkins Plain Credentials Plugin 182.v468b_97b_9dcb_8 and earlier stores secret file credentials unencrypted (only Base64 encoded) on the Jenkins controller file system, where they can be viewed by users with access to the Jenkins controller file system (global credentials) or with Item/Extended Read permission (folder-scoped credentials).
References
| Link | Resource |
|---|---|
| http://www.openwall.com/lists/oss-security/2024/06/26/2 | Mailing List |
| https://www.jenkins.io/security/advisory/2024-06-26/#SECURITY-2495 | Vendor Advisory |
| http://www.openwall.com/lists/oss-security/2024/06/26/2 | Mailing List |
| https://www.jenkins.io/security/advisory/2024-06-26/#SECURITY-2495 | Vendor Advisory |
Configurations
History
10 Oct 2025, 15:26
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:jenkins:plain_credentials:*:*:*:*:*:jenkins:*:* | |
| First Time |
Jenkins plain Credentials
Jenkins |
|
| References | () http://www.openwall.com/lists/oss-security/2024/06/26/2 - Mailing List | |
| References | () https://www.jenkins.io/security/advisory/2024-06-26/#SECURITY-2495 - Vendor Advisory |
Information
Published : 2024-06-26 17:15
Updated : 2025-10-10 15:26
NVD link : CVE-2024-39459
Mitre link : CVE-2024-39459
CVE.ORG link : CVE-2024-39459
JSON object : View
Products Affected
jenkins
- plain_credentials
CWE
CWE-922
Insecure Storage of Sensitive Information
