Unencrypted Credential Storage in Jenkins Kmap Plugin by Jenkins
CVE-2019-10294
8.8HIGH
What is CVE-2019-10294?
The Jenkins Kmap Plugin presents a significant vulnerability by storing sensitive credentials in the job config.xml files on the Jenkins master without encryption. This allows users with Extended Read permission or access to the master file system to view these unprotected credentials, potentially leading to unauthorized access or data breaches.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Jenkins Kmap Plugin all versions as of 2019-04-03
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved