Credentials Exposure in Jenkins DeployHub Plugin by CloudBees
CVE-2019-10286
8.8HIGH
Summary
The Jenkins DeployHub Plugin has a vulnerability that allows sensitive credentials to be stored unencrypted in job config.xml files on the Jenkins master server. This poses a risk as users with Extended Read permission or access to the master file system can view these unprotected credentials, leading to potential unauthorized access. Administrators should take immediate action to secure their Jenkins instances and apply available patches to mitigate this security threat.
Affected Version(s)
Jenkins DeployHub Plugin all versions as of 2019-04-03
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved