Plain Text Credential Exposure in Jenkins Aqua MicroScanner Plugin
CVE-2019-10427

5.3MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
25 September 2019

Summary

The Jenkins Aqua MicroScanner Plugin versions prior to 1.0.8 transmit configured credentials in plain text within the global Jenkins configuration form. This vulnerability could allow unauthorized users to intercept sensitive information, thus compromising the security of the system. Users are advised to upgrade to the latest version to mitigate potential risks associated with this exposure.

Affected Version(s)

Jenkins Aqua MicroScanner Plugin 1.0.7 and earlier

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.