First published: Tue Apr 30 2019(Updated: )
A missing permission check in Jenkins Ansible Tower Plugin 0.9.1 and earlier in the TowerInstallation.TowerInstallationDescriptor#doFillTowerCredentialsIdItems method allowed attackers with Overall/Read permission to enumerate credentials ID of credentials stored in Jenkins.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:ansible-tower | <=0.9.1 | 0.9.2 |
Red Hat Ansible Tower | <=0.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10312 is considered a medium-severity vulnerability due to its potential for credential enumeration.
To fix CVE-2019-10312, upgrade the Jenkins Ansible Tower Plugin to version 0.9.2 or later.
Jenkins Ansible Tower Plugin versions 0.9.1 and earlier are affected by CVE-2019-10312.
Yes, CVE-2019-10312 can be exploited by authenticated users with Overall/Read permission.
CVE-2019-10312 allows attackers to enumerate credential IDs of credentials stored in Jenkins, potentially compromising sensitive information.