Unencrypted Credential Storage Vulnerability in Jenkins SQL Change Automation Plugin
CVE-2019-16557
Key Information:
- Vendor
Jenkins
- Vendor
- CVE Published:
- 17 December 2019
What is CVE-2019-16557?
The Jenkins Redgate SQL Change Automation Plugin versions up to 2.0.3 exhibit a security flaw wherein user credentials are stored in an unencrypted format within the job config.xml files. This configuration places sensitive information at risk, as individuals with Extended Read permissions, or those with direct access to the Jenkins master's filesystem, can potentially view these credentials. This could lead to unauthorized access to the Jenkins environment and associated data, thereby compromising the security posture of the affected systems.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Jenkins Redgate SQL Change Automation Plugin <= 2.0.3
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved