CVE-2019-10449Cleartext Storage of Sensitive Info in Jenkins Fortify ON Demand

Severity
8.8HIGHNVD
EPSS
0.1%
top 74.50%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 16
Latest updateMay 24

Description

Jenkins Fortify on Demand Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

🔴Vulnerability Details

3
OSV
Jenkins Fortify on Demand Plugin stores credentials in plain text2022-05-24
GHSA
Jenkins Fortify on Demand Plugin stores credentials in plain text2022-05-24
CVEList
CVE-2019-10449: Jenkins Fortify on Demand Plugin stores credentials unencrypted in job config2019-10-16

📋Vendor Advisories

1
Jenkins
Jenkins Security Advisory 2019-10-162019-10-16
CVE-2019-10449 — Cleartext Storage of Sensitive Info | cvebase