First published: Wed Aug 07 2019(Updated: )
Jenkins Google Cloud Messaging Notification Plugin 1.0 and earlier stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Cloud Messaging Notification | <=1.0 | |
maven/org.jenkins-ci.plugins:gcm-notification | <=1.0 | |
<=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2019-10379.
The affected software is the Jenkins Google Cloud Messaging Notification Plugin version 1.0 and earlier.
The credentials are stored unencrypted in the global configuration file on the Jenkins master.
Users with access to the Jenkins master file system can view the credentials.
The severity of this vulnerability is medium with a CVSS score of 6.5.