Stored Credential Exposure in Jenkins Dynatrace Monitoring Plugin
CVE-2019-10461
7.8HIGH
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 23 October 2019
Summary
The Dynatrace Application Monitoring Plugin for Jenkins prior to version 2.1.3 is vulnerable to a security flaw where it stores sensitive user credentials unencrypted in the global configuration file. This configuration file is accessible to users who have permission to access the Jenkins master file system, potentially leading to unauthorized access to critical systems.
Affected Version(s)
Jenkins Dynatrace Application Monitoring Plugin 2.1.3 and earlier
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved