First published: Thu Apr 04 2019(Updated: )
Jenkins Audit to Database Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Audit To Database | ||
maven/org.jenkins-ci.plugins:audit2db | <=0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1003075 is classified as a high severity vulnerability due to the exposure of unencrypted credentials.
To fix CVE-2019-1003075, update the Jenkins Audit to Database Plugin to version 0.6 or later.
CVE-2019-1003075 allows users with access to the Jenkins master file system to view sensitive database credentials.
Yes, CVE-2019-1003075 affects the Jenkins Audit to Database Plugin up to version 0.5.
Any Jenkins instance using the vulnerable version of the Audit to Database Plugin and configured with unencrypted credentials is at risk.