Credential Storage Vulnerabilities in Jenkins FTP Publisher Plugin
CVE-2019-1003055
8.8HIGH
Summary
The Jenkins FTP Publisher Plugin has a vulnerability that allows credentials to be stored without encryption in the global configuration file of the Jenkins master. This flaw may enable users with access to the master file system to view sensitive information, jeopardizing the security of the Jenkins instance and potentially allowing unauthorized access to FTP services.
Affected Version(s)
Jenkins FTP publisher Plugin all versions as of 2019-04-03
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved