First published: Wed Aug 07 2019(Updated: )
Jenkins eggPlant Plugin 2.2 and earlier stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins eggPlant | <=2.2 | |
maven/org.jenkins-ci.plugins:eggplant-plugin | <=2.2 | |
<=2.2 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10385 is a vulnerability that allows local attackers to disclose sensitive information on affected installations of Jenkins eggPlant.
CVE-2019-10385 has a severity rating of 6.5 (medium).
The affected software is Jenkins eggPlant.
The specific flaw is the storage of credentials in plaintext.
Yes, authentication is required to exploit this vulnerability.