Unencrypted Credential Storage in Jenkins Kmap Plugin by Jenkins
CVE-2019-10294
8.8HIGH
Summary
The Jenkins Kmap Plugin presents a significant vulnerability by storing sensitive credentials in the job config.xml files on the Jenkins master without encryption. This allows users with Extended Read permission or access to the master file system to view these unprotected credentials, potentially leading to unauthorized access or data breaches.
Affected Version(s)
Jenkins Kmap Plugin all versions as of 2019-04-03
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved