Unencrypted Credential Storage Vulnerability in Jenkins View26 Test-Reporting Plugin
CVE-2019-10452

4.3MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
16 October 2019

Summary

The Jenkins View26 Test-Reporting Plugin is vulnerable due to the inadequate storage of credentials. Specifically, it stores sensitive credentials in plaintext within the job config.xml files on the Jenkins master. This practice exposes these credentials to users possessing Extended Read permissions or anyone with direct access to the master file system, thereby increasing the risk of unauthorized access to confidential information. Administrators should ensure they apply the necessary updates to mitigate this vulnerability.

Affected Version(s)

Jenkins View26 Test-Reporting Plugin 1.0.7 and earlier

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.