This vulnerability allows local attackers to disclose sensitive information on affected installations of Jenkins Skytap Cloud CI. Authentication is required to exploit this vulnerability. The specific flaw exists within the Skytap Cloud CI plugin. The issue results from storing credentials in plaintext. An attacker can leverage this vulnerability to execute code in the context of the build process.
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Skytap |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-19-833 is classified as high due to the potential disclosure of sensitive information.
To fix ZDI-19-833, users should update the Jenkins Skytap Cloud CI plugin to the latest version that addresses this vulnerability.
ZDI-19-833 affects installations of Jenkins with the Skytap Cloud CI plugin enabled.
Yes, authentication is required to exploit the ZDI-19-833 vulnerability, limiting the attack to local users.
Exploiting ZDI-19-833 can lead to the disclosure of sensitive information stored within the affected Jenkins installation.