{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-9453","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","state":"PUBLISHED","assignerShortName":"redhat","dateReserved":"2024-10-03T00:24:06.523Z","datePublished":"2025-07-04T08:36:35.184Z","dateUpdated":"2025-12-12T13:46:49.566Z"},"containers":{"cna":{"title":"Jenkins-image: sensitive data disclosure when using openshift jenkins image","metrics":[{"other":{"content":{"value":"Moderate","namespace":"https://access.redhat.com/security/updates/classification/"},"type":"Red Hat severity rating"}},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.1"},"format":"CVSS"}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Red Hat OpenShift Jenkins. The bearer token is not obfuscated in the logs and potentially carries a high risk if those logs are centralized when collected. The token is typically valid for one year. This flaw allows a malicious user to jeopardize the environment if they have access to sensitive information."}],"affected":[{"vendor":"Jenkins","product":"openshift-sync-plugin","versions":[{"status":"affected","version":"0","lessThan":"1.1.0.818.v3883b_3b_df89a_","versionType":"custom"}],"packageName":"openshift-sync-plugin","collectionURL":"https://github.com/jenkinsci/openshift-sync-plugin","defaultStatus":"unaffected"},{"vendor":"Red Hat","product":"OpenShift Developer Tools and Services","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"jenkins","defaultStatus":"affected","cpes":["cpe:/a:redhat:ocp_tools"]}],"references":[{"url":"https://access.redhat.com/security/cve/CVE-2024-9453","tags":["vdb-entry","x_refsource_REDHAT"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2316231","name":"RHBZ#2316231","tags":["issue-tracking","x_refsource_REDHAT"]}],"datePublic":"2025-07-04T08:31:29.662Z","problemTypes":[{"descriptions":[{"cweId":"CWE-532","description":"Insertion of Sensitive Information into Log File","lang":"en","type":"CWE"}]}],"x_redhatCweChain":"CWE-532: Insertion of Sensitive Information into Log File","workarounds":[{"lang":"en","value":"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability."}],"timeline":[{"lang":"en","time":"2024-10-03T00:21:04.654Z","value":"Reported to Red Hat."},{"lang":"en","time":"2025-07-04T08:31:29.662Z","value":"Made public."}],"credits":[{"lang":"en","value":"Red Hat would like to thank Aino de Vries for reporting this issue."}],"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2025-12-12T13:46:49.566Z"},"x_generator":{"engine":"cvelib 1.8.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-07-08T14:19:32.775749Z","id":"CVE-2024-9453","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-07-08T14:19:40.791Z"}}]}}