Plain Text Credential Exposure in Jenkins Aqua MicroScanner Plugin
CVE-2019-10427

5.3MEDIUM

Key Information:

Vendor

Jenkins

Vendor
CVE Published:
25 September 2019

What is CVE-2019-10427?

The Jenkins Aqua MicroScanner Plugin versions prior to 1.0.8 transmit configured credentials in plain text within the global Jenkins configuration form. This vulnerability could allow unauthorized users to intercept sensitive information, thus compromising the security of the system. Users are advised to upgrade to the latest version to mitigate potential risks associated with this exposure.

Affected Version(s)

Jenkins Aqua MicroScanner Plugin 1.0.7 and earlier

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2019-10427 : Plain Text Credential Exposure in Jenkins Aqua MicroScanner Plugin