First published: Thu Apr 04 2019(Updated: )
Jenkins Sametime Plugin stores credentials unencrypted in its global configuration file `hudson.plugins.sametime.im.transport.SametimePublisher.xml` on the Jenkins controller. These credentials can be viewed by users with access to the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:sametime | <=0.4 | |
IBM Sametime |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10297 has a severity rating that indicates potential exposure of unencrypted credentials stored by the Jenkins Sametime Plugin.
To fix CVE-2019-10297, upgrade the Jenkins Sametime Plugin to a version above 0.4 to ensure credentials are encrypted.
The risks associated with CVE-2019-10297 include unauthorized access to sensitive credentials by users who can access the Jenkins controller file system.
CVE-2019-10297 affects all versions of the Jenkins Sametime Plugin up to and including version 0.4.
CVE-2019-10297 is not specific to any operating systems; it affects the Jenkins Sametime Plugin regardless of the OS used.