First published: Thu Apr 04 2019(Updated: )
Jenkins DeployHub Plugin stores credentials unencrypted in job `config.xml` files on the Jenkins controller. These credentials can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Deployhub | ||
maven/com.openmake:deployhub | <8.0.14 | 8.0.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10286 has a medium severity due to the exposure of unencrypted credentials.
To fix CVE-2019-10286, update to the Jenkins DeployHub Plugin version 8.0.14 or higher.
The risks include unauthorized access to sensitive credentials stored unencrypted in job config files.
Any Jenkins instance using the DeployHub Plugin with affected configurations is at risk.
Users with Extended Read permission or access to the Jenkins controller file system can exploit CVE-2019-10286.