Skip to content

Jenkins Telegram Bot Plugin stores the Telegram Bot token in plaintext

Low severity GitHub Reviewed Published May 2, 2024 to the GitHub Advisory Database • Updated May 3, 2024

Package

maven org.jenkins-ci.plugins:telegrambot (Maven)

Affected versions

<= 1.4.0

Patched versions

None

Description

Jenkins Telegram Bot Plugin 1.4.0 and earlier stores the Telegram Bot token unencrypted in its global configuration file jenkinsci.plugins.telegrambot.TelegramBotGlobalConfiguration.xml on the Jenkins controller as part of its configuration.

This token can be viewed by users with access to the Jenkins controller file system.

As of publication of this advisory, there is no fix.

References

Published by the National Vulnerability Database May 2, 2024
Published to the GitHub Advisory Database May 2, 2024
Reviewed May 3, 2024
Last updated May 3, 2024

Severity

Low
3.3
/ 10

CVSS base metrics

Attack vector
Local
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Weaknesses

No CWEs

CVE ID

CVE-2024-34147

GHSA ID

GHSA-94pr-w968-h923
Checking history
See something to contribute? Suggest improvements for this vulnerability.