SB2019080740 - Cleartext storage of sensitive information in eggPlant plugin for Jenkins



SB2019080740 - Cleartext storage of sensitive information in eggPlant plugin for Jenkins

Published: August 7, 2019 Updated: October 4, 2019

Security Bulletin ID SB2019080740
Severity
Low
Patch available
NO
Number of vulnerabilities 1
Exploitation vector Local access
Highest impact Information disclosure

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Cleartext storage of sensitive information (CVE-ID: CVE-2019-10385)

The vulnerability allows a local user to view the password on the target system.

The vulnerability exists due to the affected software stores credentials unencrypted in job "config.xml" files on the Jenkins master. A local authenticated user with Extended Read permission or access to the master file system can obtain credentials.

Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.