First published: Tue Apr 30 2019(Updated: )
Jenkins Twitter Plugin stores credentials unencrypted in its global configuration file on the Jenkins controller. These credentials could be viewed by users with access to the Jenkins controller file system. As of publication of this advisory, there is no fix.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Twitter | <=0.7 | |
maven/org.jenkins-ci.plugins:twitter | <=0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10313 has a medium severity level due to the exposure of unencrypted credentials.
Currently, there is no fix available for CVE-2019-10313 as the Jenkins Twitter Plugin version 0.7 is affected.
The consequences of CVE-2019-10313 include potential unauthorized access to sensitive credentials by users with file system access.
CVE-2019-10313 affects all versions of the Jenkins Twitter Plugin up to and including version 0.7.
Users who have the Jenkins Twitter Plugin installed in their Jenkins instances are impacted by CVE-2019-10313.