First published: Wed Aug 07 2019(Updated: )
Jenkins TestLink Plugin 3.16 and earlier stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:testlink | <=3.16 | |
Jenkins testlink | ||
Jenkins Testlink | <=3.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-10378 is medium with a CVSS score of 5.3.
The vulnerability allows local attackers to disclose sensitive information on affected Jenkins testlink installations.
Yes, authentication is required to exploit this vulnerability.
Jenkins testlink versions up to and including 3.16 are affected by this vulnerability.
You can find more information about this vulnerability in the references provided: [1], [2], [3].