Insecure Storage of Credentials in Jenkins Assembla Auth Plugin by CloudBees
CVE-2019-10280
8.8HIGH
Summary
The Jenkins Assembla Auth Plugin, developed by CloudBees, is vulnerable due to the insecure storage of credentials in the global config.xml configuration file on the Jenkins master. This flaw allows users with access to the master file system to view sensitive credentials in an unencrypted format, potentially exposing critical information. Proper security measures and encryption methods should be implemented to mitigate this risk.
Affected Version(s)
Jenkins Assembla Auth Plugin all versions as of 2019-04-03
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved