Vulnerability Details CVE-2020-2126
Jenkins DigitalOcean Plugin 1.1 and earlier stores a token unencrypted in the global config.xml file on the Jenkins master where it can be viewed by users with access to the master file system.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 7.2%
CVSS Severity
CVSS v3 Score 4.3
CVSS v2 Score 4.0
Products affected by CVE-2020-2126
-
cpe:2.3:a:jenkins:digitalocean:0.1
-
cpe:2.3:a:jenkins:digitalocean:0.10
-
cpe:2.3:a:jenkins:digitalocean:0.11
-
cpe:2.3:a:jenkins:digitalocean:0.12
-
cpe:2.3:a:jenkins:digitalocean:0.13
-
cpe:2.3:a:jenkins:digitalocean:0.14
-
cpe:2.3:a:jenkins:digitalocean:0.14.1
-
cpe:2.3:a:jenkins:digitalocean:0.15
-
cpe:2.3:a:jenkins:digitalocean:0.16
-
cpe:2.3:a:jenkins:digitalocean:0.17
-
cpe:2.3:a:jenkins:digitalocean:0.18
-
cpe:2.3:a:jenkins:digitalocean:0.19
-
cpe:2.3:a:jenkins:digitalocean:0.19.1
-
cpe:2.3:a:jenkins:digitalocean:0.19.2
-
cpe:2.3:a:jenkins:digitalocean:0.2
-
cpe:2.3:a:jenkins:digitalocean:0.3
-
cpe:2.3:a:jenkins:digitalocean:0.4
-
cpe:2.3:a:jenkins:digitalocean:0.4.1
-
cpe:2.3:a:jenkins:digitalocean:0.5
-
cpe:2.3:a:jenkins:digitalocean:0.6
-
cpe:2.3:a:jenkins:digitalocean:0.6.1
-
cpe:2.3:a:jenkins:digitalocean:0.7
-
cpe:2.3:a:jenkins:digitalocean:0.8
-
cpe:2.3:a:jenkins:digitalocean:0.9
-
cpe:2.3:a:jenkins:digitalocean:1.0
-
cpe:2.3:a:jenkins:digitalocean:1.1