Unencrypted Credential Storage in Jenkins mabl Plugin by CloudBees
CVE-2019-10283
What is CVE-2019-10283?
The Jenkins mabl Plugin exposes user credentials by storing them unencrypted in job configuration files on the Jenkins master. This vulnerability allows users with Extended Read permission, or those who can access the master file system, to view sensitive credentials, significantly increasing the risk of unauthorized access and data breaches. It is crucial for organizations using the affected versions to implement security measures, such as restricting access to the Jenkins master and ensuring proper credential management practices.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Jenkins mabl Plugin all versions as of 2019-04-03
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved