Exposed Credentials in Jenkins Mask Passwords Plugin
CVE-2019-10370

6.5MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
7 August 2019

Summary

The Jenkins Mask Passwords Plugin versions up to and including 2.12.0 transmit globally configured passwords in plain text during the submission of configuration forms. This behavior can lead to unintended exposure of sensitive credentials, posing a significant risk to the security of Jenkins instances. Administrators should review configurations and apply updates to ensure that passwords are masked appropriately and not sent in an insecure manner.

Affected Version(s)

Jenkins Mask Passwords Plugin 2.12.0 and earlier

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.