Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS03OTN3LXEyaDUtOGg1as4AAivX
Jenkins QMetry for JIRA Plugin shows plain text password in configuration form
Jenkins QMetry for JIRA - Test Management Plugin stores a credential as part of its post-build step configuration.
While the password is stored encrypted on disk since QMetry for JIRA - Test Management Plugin 1.13, it is transmitted in plain text as part of the configuration form. This can result in exposure of the password through browser extensions, cross-site scripting vulnerabilities, and similar situations.
Permalink: https://github.com/advisories/GHSA-793w-q2h5-8h5jJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS03OTN3LXEyaDUtOGg1as4AAivX
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: almost 2 years ago
Updated: 7 months ago
CVSS Score: 3.1
CVSS vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
Identifiers: GHSA-793w-q2h5-8h5j, CVE-2019-16545
References:
- https://nvd.nist.gov/vuln/detail/CVE-2019-16545
- https://jenkins.io/security/advisory/2019-11-21/#SECURITY-727%20(2)
- http://www.openwall.com/lists/oss-security/2019/11/21/1
- https://github.com/jenkinsci/qmetry-for-jira-test-management-plugin/commit/6711f566b72c099f10b1cecab406786ca998651d
- https://github.com/advisories/GHSA-793w-q2h5-8h5j
Blast Radius: 1.0
Affected Packages
maven:org.jenkins-ci.plugins:qmetry-for-jira-test-management
Affected Version Ranges: <= 1.13Fixed in: 1.14.0