First published: Wed Sep 25 2019(Updated: )
Jenkins Call Remote Job Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Call Remote Job | <=1.0.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10422 is a vulnerability in the Jenkins Call Remote Job Plugin that allows credentials to be stored unencrypted in job config.xml files on the Jenkins master, potentially exposing them to unauthorized users.
CVE-2019-10422 has a severity of medium with a CVSS score of 6.5.
CVE-2019-10422 affects Jenkins by storing credentials unencrypted in job config.xml files on the Jenkins master.
Unauthorized users can view the credentials in Jenkins if they have Extended Read permission or access to the master file system.
To fix CVE-2019-10422, it is recommended to update the Jenkins Call Remote Job Plugin to version 1.0.22 or later, which resolves the vulnerability.