Unencrypted Credential Storage in Jenkins Azure PublisherSettings Plugin
CVE-2019-10303
Key Information:
- Vendor
Jenkins
- Vendor
- CVE Published:
- 18 April 2019
What is CVE-2019-10303?
The Jenkins Azure PublisherSettings Credentials Plugin versions up to 1.2 are affected by a vulnerability that allows sensitive credentials to be stored in an unencrypted format within the credentials.xml file on the Jenkins master server. This exposes the credentials to any user with access to the file system on the Jenkins master, potentially leading to unauthorized access or abuses of the stored credentials. Ensuring proper encryption and access control is critical to maintaining the security of sensitive data within Jenkins environments.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Jenkins Azure PublisherSettings Credentials Plugin 1.2 and earlier
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved