Exposed Credentials in Jenkins Sonar Gerrit Plugin by CloudBees
CVE-2019-10467

6.5MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
23 October 2019

Summary

The Jenkins Sonar Gerrit Plugin has a security flaw where it stores user credentials in an unencrypted format within job config.xml files on the Jenkins master. This exposes sensitive data to users with Extended Read permissions or those who have access to the master file system, posing a significant risk to data confidentiality and integrity. It's critical for users to be aware of this issue and secure their systems against potential exploitation.

Affected Version(s)

Jenkins Sonar Gerrit Plugin 2.3 and earlier

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.