Unencrypted Credential Storage in Jenkins mabl Plugin by CloudBees
CVE-2019-10283
8.8HIGH
What is CVE-2019-10283?
The Jenkins mabl Plugin exposes user credentials by storing them unencrypted in job configuration files on the Jenkins master. This vulnerability allows users with Extended Read permission, or those who can access the master file system, to view sensitive credentials, significantly increasing the risk of unauthorized access and data breaches. It is crucial for organizations using the affected versions to implement security measures, such as restricting access to the Jenkins master and ensuring proper credential management practices.
Affected Version(s)
Jenkins mabl Plugin all versions as of 2019-04-03