First published: Tue Dec 17 2019(Updated: )
Jenkins Weibo Plugin 1.0.1 and earlier stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:weibo | <=1.0.1 | |
Jenkins | <=1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-16572 is rated as a medium severity vulnerability due to its potential exposure of sensitive credentials.
To fix CVE-2019-16572, upgrade the Weibo Plugin to version 1.0.2 or later which includes proper credential storage.
CVE-2019-16572 affects the Weibo Plugin for Jenkins versions 1.0.1 and earlier, specifically impacting credential storage.
CVE-2019-16572 can be exploited by users with access to the Jenkins master file system, potentially allowing them to view unencrypted credentials.
CVE-2019-16572 is related to general security concerns regarding sensitive data management within Jenkins, emphasizing secure storage practices.