Vulnerability Details : CVE-2020-2251
Jenkins SoapUI Pro Functional Testing Plugin 1.5 and earlier transmits project passwords in its configuration in plain text as part of job configuration forms, potentially resulting in their exposure.
Threat overview for CVE-2020-2251
Top countries where our scanners detected CVE-2020-2251
Top open port discovered on systems with this issue
80
IPs affected by CVE-2020-2251 11,951
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2020-2251!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2020-2251
Probability of exploitation activity in the next 30 days: 0.05%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 20 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2020-2251
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:N/A:N |
8.0
|
2.9
|
NIST |
4.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
2.8
|
1.4
|
NIST |
CWE ids for CVE-2020-2251
-
The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.Assigned by:
- jenkinsci-cert@googlegroups.com (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2020-2251
-
https://jenkins.io/security/advisory/2020-09-01/#SECURITY-1631%20(2)
Jenkins Security Advisory 2020-09-01Vendor Advisory
-
https://jenkins.io/security/advisory/2020-09-01/#SECURITY-1631%20%282%29
Jenkins Security Advisory 2020-09-01
-
http://www.openwall.com/lists/oss-security/2020/09/01/3
oss-security - Multiple vulnerabilities in Jenkins pluginsMailing List;Third Party Advisory
Products affected by CVE-2020-2251
- cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:jenkins:*:*
- cpe:2.3:a:jenkins:soapui_pro_functional_testing:*:*:*:*:*:jenkins:*:*