This vulnerability allows local attackers to disclose sensitive information on affected installations of Jenkins testlink. Authentication is required to exploit this vulnerability. The specific flaw exists within the testlink plugin. The issue results from storing credentials in plaintext. An attacker can leverage this vulnerability to execute code in the context of the build process.
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins testlink |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-19-839 is considered high due to the potential disclosure of sensitive information.
To fix ZDI-19-839, update the Jenkins testlink plugin to the latest version.
Authentication is required to exploit ZDI-19-839, meaning an attacker must have valid credentials.
ZDI-19-839 can potentially disclose stored credentials, which can lead to further security risks.
ZDI-19-839 affects the Jenkins testlink plugin specifically.