First published: Wed Sep 25 2019(Updated: )
Jenkins Assembla Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Assembla | <=1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-10420.
The title of the vulnerability is 'Jenkins Assembla Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.'
The severity of CVE-2019-10420 is medium with a severity value of 5.5.
The Jenkins Assembla Plugin version 1.4 is affected by CVE-2019-10420.
To fix CVE-2019-10420, it is recommended to upgrade to a version of Jenkins Assembla Plugin that is not affected by this vulnerability or to apply the necessary security patches.