Jenkins NeoLoad Plugin 2.2.5 and earlier stored credentials unencrypted in its global configuration file and in job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2019/10/16/6 | Mailing List |
https://jenkins.io/security/advisory/2019-10-16/#SECURITY-1427 | Vendor Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-19-932/ | Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: jenkins
Published: 2019-10-16T13:00:46
Updated: 2023-10-24T16:49:40.659Z
Reserved: 2019-03-29T00:00:00
Link: CVE-2019-10440
JSON object: View
NVD Information
Status : Modified
Published: 2019-10-16T14:15:12.043
Modified: 2023-10-25T18:16:23.637
Link: CVE-2019-10440
JSON object: View
Redhat Information
No data.
CWE