First published: Wed Oct 23 2019(Updated: )
Jenkins Bitbucket OAuth Plugin 0.9 and earlier stored credentials unencrypted in the global config.xml configuration file on the Jenkins master where they could be viewed by users with access to the master file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:bitbucket-oauth | <0.10 | 0.10 |
Jenkins Bitbucket OAuth | <=0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10460 is considered a high severity vulnerability due to unencrypted storage of credentials.
To fix CVE-2019-10460, upgrade the Jenkins Bitbucket OAuth Plugin to version 0.10 or later.
The risks associated with CVE-2019-10460 include unauthorized access to sensitive credentials by users who can access the Jenkins master file system.
All versions of Jenkins Bitbucket OAuth Plugin up to and including 0.9 are affected by CVE-2019-10460.
CVE-2019-10460 is classified as a credential management vulnerability due to the unencrypted storage of sensitive data.