First published: Wed Sep 25 2019(Updated: )
Jenkins NeuVector Vulnerability Scanner Plugin 1.5 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Neuvector Vulnerability Scanner | <=1.5 | |
maven/io.jenkins.plugins:neuvector-vulnerability-scanner | <=1.5 | 1.6 |
<=1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10430 is a vulnerability in Jenkins NeuVector Vulnerability Scanner Plugin 1.5 and earlier that stored credentials unencrypted in its global configuration file on the Jenkins master, allowing users with access to the master file system to view them.
The severity of CVE-2019-10430 is medium, with a severity value of 5.5.
CVE-2019-10430 allows users with access to the Jenkins master file system to view unencrypted credentials stored in the global configuration file of Jenkins NeuVector Vulnerability Scanner Plugin.
To fix CVE-2019-10430, it is recommended to upgrade Jenkins NeuVector Vulnerability Scanner Plugin to a version later than 1.5.
You can find more information about CVE-2019-10430 vulnerability in the references provided: [Reference 1](http://www.openwall.com/lists/oss-security/2019/09/25/3) and [Reference 2](https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1504).