First published: Thu Jul 11 2019(Updated: )
Jenkins Port Allocator Plugin stores credentials unencrypted in job `config.xml` files on the Jenkins controller. These credentials can be viewed by users with Extended Read permission, or access to the Jenkins controller file system. As of publication of this advisory, there is no fix.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:port-allocator | <=1.10 | |
Jenkins Port Allocator | <=1.8 | |
Jenkins Port Allocator |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10350 has a moderate severity level as it allows unauthorized users to access unencrypted credentials.
To fix CVE-2019-10350, you should upgrade the Jenkins Port Allocator Plugin to version 1.11 or later.
CVE-2019-10350 affects Jenkins Port Allocator versions up to and including 1.10.
Users with Extended Read permissions or access to the Jenkins controller file system are at risk due to CVE-2019-10350.
CVE-2019-10350 compromises unencrypted credentials stored in job config.xml files.