Stored Credential Exposure in Jenkins Dynatrace Monitoring Plugin
CVE-2019-10461

7.8HIGH

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
23 October 2019

Summary

The Dynatrace Application Monitoring Plugin for Jenkins prior to version 2.1.3 is vulnerable to a security flaw where it stores sensitive user credentials unencrypted in the global configuration file. This configuration file is accessible to users who have permission to access the Jenkins master file system, potentially leading to unauthorized access to critical systems.

Affected Version(s)

Jenkins Dynatrace Application Monitoring Plugin 2.1.3 and earlier

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.