Stored Token Exposure in Jenkins Mattermost Notification Plugin
CVE-2019-10459
6.5MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 23 October 2019
Summary
The Jenkins Mattermost Notification Plugin versions up to 2.7.0 is susceptible to a vulnerability where webhook URLs containing sensitive tokens are stored unencrypted in the global configuration file and job config.xml files on the Jenkins master. This allows any user with Extended Read permission or file system access to the Jenkins master to view these tokens, potentially compromising the integrity and security of the associated services. Proper handling and encryption of sensitive information are essential to mitigate such vulnerabilities.
Affected Version(s)
Jenkins Mattermost Notification Plugin 2.7.0 and earlier
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved