First published: Wed Sep 25 2019(Updated: )
Inedo ProGet Plugin Plugin stores a service password in its global Jenkins configuration. While the password is stored encrypted on disk, it was transmitted in plain text as part of the configuration form. This could result in exposure of the password through browser extensions, cross-site scripting vulnerabilities, and similar situations. Inedo ProGet Plugin Plugin now encrypts the password transmitted to administrators viewing the global configuration form.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/com.inedo.proget:inedo-proget | <1.3 | 1.3 |
Inedo ProGet | <=1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10412 is considered to be a moderate severity vulnerability due to the exposure of sensitive data.
To fix CVE-2019-10412, update the Inedo ProGet Plugin Plugin to version 1.3 or later.
CVE-2019-10412 affects the Inedo ProGet Plugin Plugin for Jenkins and specific versions of the software.
The impact of CVE-2019-10412 includes potential exposure of service passwords transmitted in plain text.
Yes, a patch is available by upgrading to the recommended version of the Inedo ProGet Plugin Plugin.