First published: Thu Apr 04 2019(Updated: )
Jenkins Minio Storage Plugin stores credentials unencrypted in its global configuration file `org.jenkinsci.plugins.minio.MinioUploader.xml` on the Jenkins controller. These credentials can be viewed by users with access to the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Minio Storage | ||
maven/org.jenkins-ci.plugins:minio-storage | <=0.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10285 is classified as a high severity vulnerability due to the exposure of sensitive credentials.
To fix CVE-2019-10285, you should upgrade the Jenkins Minio Storage Plugin to a version later than 0.0.3 which addresses the unencrypted storage issue.
CVE-2019-10285 affects users of the Jenkins Minio Storage Plugin with versions up to and including 0.0.3.
The implications of CVE-2019-10285 include unauthorized access to unencrypted credentials stored in the Jenkins configuration file.
To secure your Jenkins instance against CVE-2019-10285, ensure you update the Minio Storage Plugin and restrict file system access to the Jenkins controller.