{"vulnerability": "CVE-2022-27195", "sightings": [{"uuid": "396ac023-b8bc-41b8-92d6-b9cdcd5a9781", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27195", "type": "seen", "source": "https://t.me/cibsecurity/38936", "content": "\u203c CVE-2022-27195 \u203c\n\nJenkins Parameterized Trigger Plugin 2.43 and earlier captures environment variables passed to builds triggered using Jenkins Parameterized Trigger Plugin, including password parameter values, in their `build.xml` files. These values are stored unencrypted and can be viewed by users with access to the Jenkins controller file system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-15T19:19:27.000000Z"}]}