First published: Thu Apr 18 2019(Updated: )
Jenkins jira-ext Plugin 0.8 and earlier stored credentials unencrypted in its global configuration file `hudson.plugins.jira.JiraProjectProperty.xml` on the Jenkins master. These credentials could be viewed by users with access to the Jenkins master file system. jira-ext Plugin version 0.9 stores credentials encrypted.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:jira-ext | <0.9 | 0.9 |
Jenkins Jira-ext | <=0.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10302 is classified as a medium severity vulnerability.
To fix CVE-2019-10302, update the jira-ext Plugin to version 0.9 or later.
The risks of CVE-2019-10302 include unauthorized access to unencrypted credentials stored in the Jenkins master file system.
CVE-2019-10302 affects jira-ext Plugin versions 0.8 and earlier.
Users or organizations using vulnerable versions of the Jenkins jira-ext Plugin are impacted by CVE-2019-10302.