Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.jenkins-ci.plugins/subversion
  4. ›
  5. CVE-2013-6372

CVE-2013-6372: Jenkins Subversion Plugin Stores Credentials with Base64 Encoding

May 17, 2022 (updated March 13, 2025)

The Subversion plugin before 1.54 for Jenkins stores credentials using base64 encoding, which allows local users to obtain passwords and SSH private keys by reading a subversion.credentials file.

References

  • access.redhat.com/errata/RHBA-2014:1630
  • access.redhat.com/security/cve/CVE-2013-6372
  • bugzilla.redhat.com/show_bug.cgi?id=1032391
  • github.com/advisories/GHSA-c4fr-gx5w-8qf2
  • github.com/jenkinsci/subversion-plugin
  • github.com/jenkinsci/subversion-plugin/commit/7d4562d6f7e40de04bbe29577b51c79f07d05ba6
  • nvd.nist.gov/vuln/detail/CVE-2013-6372
  • wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-11-20

Code Behaviors & Features

Detect and mitigate CVE-2013-6372 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.54

Fixed versions

  • 1.54

Solution

Upgrade to version 1.54 or above.

Impact 2.1 LOW

AV:L/AC:L/Au:N/C:P/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-326: Inadequate Encryption Strength

Source file

maven/org.jenkins-ci.plugins/subversion/CVE-2013-6372.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:02 +0000.