First published: Thu Apr 04 2019(Updated: )
Jenkins StarTeam Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Starteam | ||
maven/hudson.plugins:starteam | <=0.6.13 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10277 is classified as a high severity vulnerability due to the potential exposure of unencrypted credentials.
To fix CVE-2019-10277, you should upgrade the Jenkins StarTeam Plugin to a version that no longer stores credentials unencrypted.
CVE-2019-10277 affects all users of the Jenkins StarTeam Plugin versions up to and including 0.6.13.
CVE-2019-10277 exposes user credentials stored in the job config.xml files on the Jenkins master.
Users with Extended Read permission or direct access to the Jenkins master file system can view the unencrypted credentials affected by CVE-2019-10277.