Insufficiently Protected Credentials in Jenkins Repository Connector Plugin by Jenkins
CVE-2019-1003038
7.8HIGH
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 8 March 2019
Summary
A vulnerability exists in the Jenkins Repository Connector Plugin that allows an attacker with local file system access or control of a Jenkins administrator's web browser to access sensitive password information stored in the plugin's configuration. Specifically, components such as ArtifactDeployer.java, Repository.java, and UserPwd.java have inadequate safeguards, which could lead to unauthorized retrieval of credentials. This highlights the importance of securing sensitive information within plugin settings and the potential use of malicious browser extensions.
Affected Version(s)
Jenkins Repository Connector Plugin 1.2.4 and earlier
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved