Stored Credential Vulnerability in Netsparker Cloud Scan Plugin by Jenkins
CVE-2019-10291
8.8HIGH
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 4 April 2019
Summary
The Netsparker Cloud Scan Plugin for Jenkins prior to version 1.1.5 stores user credentials in an unencrypted format within its global configuration file on the Jenkins master. This security flaw allows any user with access to the Jenkins master file system to view sensitive information, potentially leading to unauthorized access and exploitation of associated systems. It is crucial for users of the affected plugin to update to the latest version to mitigate these risks.
Affected Version(s)
Jenkins Netsparker Cloud Scan Plugin 1.1.5 and older
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved