First published: Thu Apr 04 2019(Updated: )
Jenkins Jabber Server Plugin stores credentials unencrypted in its global configuration file `de.e_nexus.jabber.JabberBuilder.xml` on the Jenkins controller. These credentials can be viewed by users with access to the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Jabber Server | ||
maven/de.e-nexus:jabber-server-plugin | <=1.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10288 has a medium severity level due to the exposure of unencrypted credentials in the Jenkins Jabber Server Plugin.
To fix CVE-2019-10288, update the Jenkins Jabber Server Plugin to version 1.9 or later.
CVE-2019-10288 involves storing sensitive credentials such as usernames and passwords in an unencrypted format.
Any user with access to the Jenkins controller file system is affected by CVE-2019-10288.
CVE-2019-10288 affects the Jenkins Jabber Server Plugin up to version 1.9.