Unencrypted Credential Storage Vulnerability in Jenkins SQL Change Automation Plugin
CVE-2019-16557

6.5MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
17 December 2019

Summary

The Jenkins Redgate SQL Change Automation Plugin versions up to 2.0.3 exhibit a security flaw wherein user credentials are stored in an unencrypted format within the job config.xml files. This configuration places sensitive information at risk, as individuals with Extended Read permissions, or those with direct access to the Jenkins master's filesystem, can potentially view these credentials. This could lead to unauthorized access to the Jenkins environment and associated data, thereby compromising the security posture of the affected systems.

Affected Version(s)

Jenkins Redgate SQL Change Automation Plugin <= 2.0.3

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.