First published: Fri Mar 08 2019(Updated: )
An insufficiently protected credentials vulnerability exists in Jenkins Repository Connector Plugin 1.2.4 and earlier in src/main/java/org/jvnet/hudson/plugins/repositoryconnector/ArtifactDeployer.java, src/main/java/org/jvnet/hudson/plugins/repositoryconnector/Repository.java, src/main/java/org/jvnet/hudson/plugins/repositoryconnector/UserPwd.java that allows an attacker with local file system access or control of a Jenkins administrator's web browser (e.g. malicious extension) to retrieve the password stored in the plugin configuration.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Repository Connector | <=1.2.4 | |
maven/org.jenkins-ci.plugins:repository-connector | <=1.2.4 | 1.2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1003038 has a severity rating of medium due to insufficiently protected credentials.
To fix CVE-2019-1003038, upgrade the Jenkins Repository Connector Plugin to version 1.2.5 or later.
CVE-2019-1003038 affects Jenkins Repository Connector Plugin version 1.2.4 and earlier.
The implications of CVE-2019-1003038 include the potential exposure of sensitive credentials.
No, CVE-2019-1003038 is no longer a threat if you update to version 1.2.5 or later of the plugin.