๐Ÿ” CVE Alert

CVE-2024-9453

MEDIUM 6.5

Jenkins-image: sensitive data disclosure when using openshift jenkins image

CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability was found in Red Hat OpenShift Jenkins. The bearer token is not obfuscated in the logs and potentially carries a high risk if those logs are centralized when collected. The token is typically valid for one year. This flaw allows a malicious user to jeopardize the environment if they have access to sensitive information.

CWE CWE-532
Vendor jenkins
Product openshift-sync-plugin
Ecosystems
Industries
Technology
Published Jul 4, 2025
Last Updated Dec 12, 2025
Stay Ahead of the Next One

Get instant alerts for jenkins openshift-sync-plugin

Be the first to know when new medium vulnerabilities affecting jenkins openshift-sync-plugin are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Affected Versions

Jenkins / openshift-sync-plugin
0 < 1.1.0.818.v3883b_3b_df89a_
Red Hat / OpenShift Developer Tools and Services
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/security/cve/CVE-2024-9453 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2316231

Credits

Red Hat would like to thank Aino de Vries for reporting this issue.