First published: Wed Sep 25 2019(Updated: )
Jenkins Gem Publisher Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins | <=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10426 is classified as a medium severity vulnerability due to the exposure of unencrypted credentials.
To fix CVE-2019-10426, upgrade the Jenkins Gem Publisher Plugin to version 1.0 or later.
CVE-2019-10426 affects all versions of the Jenkins Gem Publisher Plugin prior to version 1.0.
CVE-2019-10426 exposes credentials stored unencrypted in the global configuration file.
Users with access to the Jenkins master file system are at risk of viewing the exposed credentials due to CVE-2019-10426.