First published: Wed Sep 25 2019(Updated: )
Jenkins GitLab Logo Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:gitlab-logo | <1.0.4 | 1.0.4 |
Jenkins GitLab | <=1.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10429 is considered to be a high severity vulnerability due to the potential exposure of sensitive credentials.
To fix CVE-2019-10429, upgrade the Jenkins GitLab Logo Plugin to version 1.0.4 or higher.
The consequences of CVE-2019-10429 include unauthorized access to sensitive credentials stored unencrypted on the Jenkins master.
CVE-2019-10429 affects GitLab Logo Plugin versions up to and including 1.0.3.
Users with access to the Jenkins master file system are at risk from CVE-2019-10429 as they can view the stored unencrypted credentials.