First published: Thu Apr 04 2019(Updated: )
Jenkins Koji Plugin stores credentials unencrypted in its global configuration file `org.jenkinsci.plugins.koji.KojiBuilder.xml` on the Jenkins controller. These credentials can be viewed by users with access to the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Koji | ||
maven/org.jenkins-ci.plugins:koji | <=0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10298 is considered a high severity vulnerability due to the exposure of unencrypted credentials.
To fix CVE-2019-10298, you should upgrade the Jenkins Koji Plugin to version 0.4 or later which addresses the unencrypted storage of credentials.
All versions of the Jenkins Koji Plugin up to and including version 0.3 are affected by CVE-2019-10298.
CVE-2019-10298 affects any credentials stored in the global configuration file of the Jenkins Koji Plugin, including sensitive authentication details.
CVE-2019-10298 requires local access to the Jenkins controller file system to exploit, making it less likely to be exploited remotely.