First published: Wed Oct 16 2019(Updated: )
Jenkins iceScrum Plugin 1.1.4 and earlier stored credentials unencrypted in job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Icescrum | <=1.1.4 | |
Jenkins iceScrum |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10443 is classified as a high severity vulnerability due to the exposure of unencrypted credentials.
To fix CVE-2019-10443, upgrade the iceScrum Plugin to version 1.1.5 or later, which addresses the vulnerability.
CVE-2019-10443 affects users of the Jenkins iceScrum Plugin version 1.1.4 and earlier.
CVE-2019-10443 allows local attackers with Extended Read permission to view stored unencrypted credentials in job config files.
To prevent similar vulnerabilities, always ensure that plugins are kept up to date and implement strict access controls.