Plain Text Credential Exposure in Jenkins Aqua MicroScanner Plugin
CVE-2019-10427
5.3MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 25 September 2019
Summary
The Jenkins Aqua MicroScanner Plugin versions prior to 1.0.8 transmit configured credentials in plain text within the global Jenkins configuration form. This vulnerability could allow unauthorized users to intercept sensitive information, thus compromising the security of the system. Users are advised to upgrade to the latest version to mitigate potential risks associated with this exposure.
Affected Version(s)
Jenkins Aqua MicroScanner Plugin 1.0.7 and earlier
References
CVSS V3.1
Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved