Proxy Password Exposure in Jenkins Configuration as Code Plugin
CVE-2019-10345

5.5MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
31 July 2019

Summary

The Jenkins Configuration as Code Plugin prior to version 1.21 has a security issue where proxy passwords are logged in plaintext and not encrypted during export. This inadequate handling of sensitive information poses risks, as attackers could potentially exploit this exposure to gain unauthorized access. It is crucial for users to upgrade to the latest version to mitigate these security risks.

Affected Version(s)

Jenkins Configuration as Code Plugin 1.20 and earlier

References

CVSS V3.1

Score:
5.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.