First published: Wed Oct 16 2019(Updated: )
Jenkins Sofy.AI Plugin stores an API token unencrypted in job config.xml files on the Jenkins controller. This token can be viewed by users with Extended Read permission or access to the Jenkins controller file system. As of publication of this advisory there is no fix.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/io.jenkins.plugins:sofy-ai | <=1.0.3 | |
Jenkins | <=1.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10447 is considered a medium severity vulnerability due to the exposure of unencrypted API tokens.
As of now, there is no fix available for CVE-2019-10447.
CVE-2019-10447 affects Jenkins Sofy.AI Plugin versions up to and including 1.0.3.
CVE-2019-10447 allows users with Extended Read permission or file system access to view stored unencrypted API tokens.
Currently, there are no recommended workarounds for CVE-2019-10447.