CVE-2023-24450
Description
Jenkins view-cloner Plugin 1.1 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Jenkins view-cloner Plugin 1.1 and earlier stores passwords unencrypted in job config.xml files, exposing them to users with Extended Read or file system access.
The Jenkins view-cloner Plugin is designed to copy and modify views and jobs in bulk. In versions 1.1 and earlier, the plugin stores passwords in plain text within job config.xml files on the Jenkins controller [1][2]. This means that any password used in job configurations is written to disk without encryption.
To exploit this vulnerability, an attacker needs either the Extended Read permission (a Jenkins permission that allows viewing job configurations) or direct access to the Jenkins controller's file system [2]. With these privileges, the attacker can read the config.xml files and extract any stored passwords.
The impact is severe: an attacker who obtains these passwords can use them to access other systems or escalate privileges within the Jenkins environment. Since passwords are stored in plain text, there is no need for decryption.
As of the latest advisory, no fixed version has been released for the view-cloner Plugin [1]. Users are advised to avoid storing passwords in job configurations if possible, or to restrict access to the controller file system and assign Extended Read permission only to trusted users. The plugin's GitHub repository shows no recent updates addressing this issue [3].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jenkins-ci.plugins:view-clonerMaven | <= 1.1 | — |
Affected products
1- Range: unspecified
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-6hw7-x86v-wrgfghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-24450ghsaADVISORY
- www.jenkins.io/security/advisory/2023-01-24/ghsaWEB
News mentions
1- Jenkins Security Advisory 2023-01-24Jenkins Security Advisories · Jan 24, 2023