First published: Wed Sep 25 2019(Updated: )
Jenkins elOyente Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Eloyente | <=1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10424 is considered a high severity vulnerability because it exposes sensitive credentials unencrypted.
To fix CVE-2019-10424, upgrade the Jenkins elOyente Plugin to version 1.4 or higher.
CVE-2019-10424 allows unauthorized users to access unencrypted credentials stored in the Jenkins master configuration file.
CVE-2019-10424 affects versions up to and including 1.3 of the Jenkins elOyente Plugin.
Users with file system access to the Jenkins master are at risk from CVE-2019-10424 due to the exposure of sensitive credentials.