First published: Thu Apr 04 2019(Updated: )
Jenkins Serena SRA Deploy Plugin stores credentials unencrypted in its global configuration file `com.urbancode.ds.jenkins.plugins.serenarapublisher.UrbanDeployPublisher.xml` on the Jenkins controller. These credentials can be viewed by users with access to the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Serena Sra Deploy | ||
maven/com.urbancode.ds.jenkins.plugins:sra-deploy | <=1.4.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10296 is considered a critical vulnerability due to the exposure of unencrypted credentials.
To fix CVE-2019-10296, upgrade the Jenkins Serena SRA Deploy Plugin to a version later than 1.4.2.4.
CVE-2019-10296 affects users of the Jenkins Serena SRA Deploy Plugin version 1.4.2.4 and earlier.
CVE-2019-10296 compromises sensitive user credentials stored in the Jenkins global configuration file.
If upgrading is not possible, restrict file system access to the Jenkins controller to prevent unauthorized access to the configuration file.