Stored Credential Vulnerability in Netsparker Cloud Scan Plugin by Jenkins
CVE-2019-10291
8.8HIGH
Key Information:
- Vendor
Jenkins
- Vendor
- CVE Published:
- 4 April 2019
What is CVE-2019-10291?
The Netsparker Cloud Scan Plugin for Jenkins prior to version 1.1.5 stores user credentials in an unencrypted format within its global configuration file on the Jenkins master. This security flaw allows any user with access to the Jenkins master file system to view sensitive information, potentially leading to unauthorized access and exploitation of associated systems. It is crucial for users of the affected plugin to update to the latest version to mitigate these risks.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Jenkins Netsparker Cloud Scan Plugin 1.1.5 and older
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved