Jenkins Nouvola DiveCloud Plugin 1.08 and earlier stores DiveCloud API Keys and Credentials Encryption Keys unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
References
Link | Resource |
---|---|
https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3526 | Vendor Advisory |
Configurations
History
18 Jul 2025, 18:48
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:jenkins:nouvola_divecloud:*:*:*:*:*:jenkins:*:* | |
First Time |
Jenkins
Jenkins nouvola Divecloud |
|
References | () https://www.jenkins.io/security/advisory/2025-07-09/#SECURITY-3526 - Vendor Advisory |
10 Jul 2025, 13:17
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-09 16:15
Updated : 2025-07-18 18:48
NVD link : CVE-2025-53670
Mitre link : CVE-2025-53670
CVE.ORG link : CVE-2025-53670
JSON object : View
Products Affected
jenkins
- nouvola_divecloud
CWE
CWE-312
Cleartext Storage of Sensitive Information