Proxy Password Exposure in Jenkins Configuration as Code Plugin
CVE-2019-10345
5.5MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 31 July 2019
Summary
The Jenkins Configuration as Code Plugin prior to version 1.21 has a security issue where proxy passwords are logged in plaintext and not encrypted during export. This inadequate handling of sensitive information poses risks, as attackers could potentially exploit this exposure to gain unauthorized access. It is crucial for users to upgrade to the latest version to mitigate these security risks.
Affected Version(s)
Jenkins Configuration as Code Plugin 1.20 and earlier
References
CVSS V3.1
Score:
5.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved