First published: Thu Apr 04 2019(Updated: )
Jenkins Klaros-Testmanagement Plugin stores credentials unencrypted in job `config.xml` files on the Jenkins controller. These credentials can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Klaros-testmanagement | ||
maven/hudson.plugins.klaros:klaros-testmanagement | <=2.0.0 | 2.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10282 is classified as a high-severity vulnerability due to the potential exposure of sensitive credentials.
To fix CVE-2019-10282, update the Jenkins Klaros-Testmanagement Plugin to version 2.1.0 or later.
CVE-2019-10282 affects users of the Jenkins Klaros-Testmanagement Plugin versions up to and including 2.0.0.
The main risk associated with CVE-2019-10282 is that unencrypted credentials can be accessed by unauthorized users.
CVE-2019-10282 specifically exploits the storage of credentials in unencrypted format in job config.xml files.