Unencrypted Credential Storage Vulnerability in Jenkins View26 Test-Reporting Plugin
CVE-2019-10452
4.3MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 16 October 2019
Summary
The Jenkins View26 Test-Reporting Plugin is vulnerable due to the inadequate storage of credentials. Specifically, it stores sensitive credentials in plaintext within the job config.xml files on the Jenkins master. This practice exposes these credentials to users possessing Extended Read permissions or anyone with direct access to the master file system, thereby increasing the risk of unauthorized access to confidential information. Administrators should ensure they apply the necessary updates to mitigate this vulnerability.
Affected Version(s)
Jenkins View26 Test-Reporting Plugin 1.0.7 and earlier
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved