Credential Exposure in Jenkins Aqua Security Scanner Plugin
CVE-2019-10428
Key Information:
- Vendor
Jenkins
- Vendor
- CVE Published:
- 25 September 2019
What is CVE-2019-10428?
The Aqua Security Scanner Plugin for Jenkins prior to version 3.0.18 contains a vulnerability that allows configured credentials to be transmitted in plain text during the global Jenkins configuration process. This flaw raises concerns regarding potential unauthorized exposure of sensitive information, leading to heightened security risks for users and organizations relying on this plugin. Users are strongly recommended to upgrade to a patched version to mitigate the risk and protect their credential data.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Jenkins Aqua Security Scanner Plugin 3.0.17 and earlier
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved