Stored Credential Exposure in Jenkins GitLab Plugin
CVE-2019-10416
6.5MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 25 September 2019
Summary
The Jenkins GitLab Plugin prior to version 2.28 is susceptible to a security issue where stored credentials are not encrypted in the job config.xml files. This creates an opportunity for users with Extended Read permissions, or those who have access to the master file system, to view sensitive credentials, leading to potential unauthorized access and security breaches.
Affected Version(s)
Jenkins Violation Comments to GitLab Plugin 2.28 and earlier
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved