First published: Thu Apr 04 2019(Updated: )
Jenkins FTP publisher Plugin stores credentials unencrypted in its global configuration file `com.zanox.hudson.plugins.FTPPublisher.xml` on the Jenkins controller. These credentials can be viewed by users with access to the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Ftp Publisher | ||
maven/org.jvnet.hudson.plugins:ftppublisher | <=1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-1003055 is classified as high due to the exposure of unencrypted credentials.
To fix CVE-2019-1003055, update the Jenkins FTP Publisher Plugin to a version higher than 1.2.
Jenkins users who have the FTP Publisher Plugin versions up to 1.2 installed are affected by CVE-2019-1003055.
CVE-2019-1003055 exposes FTP credentials stored unencrypted in the Jenkins global configuration file.
The main risk of CVE-2019-1003055 is unauthorized access to sensitive FTP credentials, potentially leading to data breaches.