First published: Wed Oct 16 2019(Updated: )
Jenkins Extensive Testing Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Extensive Testing | =1.4.3-beta | |
Jenkins Extensive Testing | =1.4.4-beta | |
maven/jenkins.xtc:extensivetesting | =1.4.4b |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10448 is considered a medium severity vulnerability due to its potential exposure of unencrypted credentials.
To fix CVE-2019-10448, upgrade the Jenkins Extensive Testing Plugin to version 1.4.5 or later, which addresses the credential storage issue.
CVE-2019-10448 affects users of Jenkins Extensive Testing Plugin versions 1.4.3-beta and 1.4.4-beta.
Attackers with Extended Read permission or access to the Jenkins master file system can view sensitive credentials stored in job config.xml files.
CVE-2019-10448 was disclosed on October 16, 2019.