First published: Thu Jul 11 2019(Updated: )
Jenkins Caliper CI Plugin stores credentials unencrypted in job `config.xml` files on the Jenkins controller. These credentials can be viewed by users with Extended Read permission, or access to the Jenkins controller file system. As of publication of this advisory, there is no fix.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Caliper CI | ||
maven/com.brianfromoregon:caliper-ci | <=2.3 | |
Jenkins Caliper Ci Jenkins | <=2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10351 has a moderate severity due to the exposure of unencrypted credentials.
As of now, there is no fix available for CVE-2019-10351.
CVE-2019-10351 affects users of the Jenkins Caliper CI Plugin version up to 2.3.
The consequence of CVE-2019-10351 is that sensitive credentials may be exposed to users with Extended Read permission.
To mitigate CVE-2019-10351, restrict access to Jenkins controller file systems and limit Extended Read permissions.