CVE-2019-10348

Severity
8.8HIGH
EPSS
0.1%
top 74.95%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 11
Latest updateMay 24

Description

Jenkins Gogs Plugin stored credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages3 packages

CVEListV5jenkins_project/jenkins_gogs_plugin1.0.14 and earlier
NVDjenkins/gogs1.0.14

🔴Vulnerability Details

3
GHSA
Jenkins Gogs Plugin stored credentials in plain text2022-05-24
OSV
Jenkins Gogs Plugin stored credentials in plain text2022-05-24
CVEList
CVE-2019-10348: Jenkins Gogs Plugin stored credentials unencrypted in job config2019-07-11

📋Vendor Advisories

1
Jenkins
Jenkins Security Advisory 2019-07-112019-07-11

🕵️Threat Intelligence

7
Trendmicro
Hiding in Plain Text: Jenkins Plugin Vulnerabilities2019-08-30
Trendmicro
Hiding in Plain Text: Jenkins Plugin Vulnerabilities2019-08-30
Trendmicro
Hiding in Plain Text: Jenkins Plugin Vulnerabilities2019-08-30
Trendmicro
Hiding in Plain Text: Jenkins Plugin Vulnerabilities2019-08-30
Trendmicro
Hiding in Plain Text: Jenkins Plugin Vulnerabilities2019-08-30
CVE-2019-10348 (HIGH CVSS 8.8) | Jenkins Gogs Plugin stored credenti | cvebase.io