First published: Wed Jul 31 2019(Updated: )
Jenkins Skytap Cloud CI Plugin 2.06 and earlier stored credentials unencrypted in job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Skytap Cloud Ci | <=2.06 | |
Jenkins Skytap | ||
maven/org.jenkins-ci.plugins:skytap | <=2.06 | 2.07 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10366 is considered a high-severity vulnerability due to the potential exposure of sensitive credentials.
To fix CVE-2019-10366, upgrade the Jenkins Skytap Cloud CI Plugin to version 2.07 or later.
CVE-2019-10366 allows local attackers with access to the Jenkins master to view unencrypted credentials stored in job config.xml files.
CVE-2019-10366 affects users of Jenkins Skytap Cloud CI Plugin versions 2.06 and earlier.
CVE-2019-10366 is not a remote vulnerability; it requires local access to the Jenkins master system.