First published: Thu Apr 04 2019(Updated: )
Jenkins Kmap Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Kmap | ||
maven/org.jenkins-ci.plugins:kmap-jenkins | =1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10294 is classified as a medium severity vulnerability.
To fix CVE-2019-10294, upgrade the Jenkins Kmap Plugin to version 1.7 or later.
The consequences of CVE-2019-10294 include exposing sensitive credentials to users with Extended Read permission.
All versions of the Jenkins Kmap Plugin prior to 1.7 are affected by CVE-2019-10294.
Jenkins administrators and users with access to the Jenkins master should be concerned about CVE-2019-10294 due to potential credential exposure.