First published: Tue Oct 01 2019(Updated: )
Jenkins Dingding notifications Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Dingding | <=1.9 | |
Jenkins dingding-notifications | ||
maven/io.jenkins.plugins:dingding-notifications | <=1.9 | 2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10433 is categorized as a high severity vulnerability due to the exposure of unencrypted credentials.
To fix CVE-2019-10433, update the Jenkins Dingding notifications Plugin to version 2.0.0 or later.
Versions up to and including 1.9 of the Jenkins Dingding notifications Plugin are affected by CVE-2019-10433.
Users with Extended Read permission or access to the Jenkins master file system can view the unencrypted credentials affected by CVE-2019-10433.
Credentials in job config.xml files can be protected by properly managing user permissions on the Jenkins master system.