Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS0zaHc2LWdjOGgtOTI0M84AAWQT

Jenkins meliora-testlab Plugin allows attackers with file system access to Jenkins master to obtain API key

An exposure of sensitive information vulnerability exists in Jenkins meliora-testlab Plugin 1.14 and earlier in TestlabNotifier.java that allows attackers with file system access to the Jenkins master to obtain the API key stored in this plugin's configuration. Additionally, the API key was not masked from view using a password form field. As of version 1.15, the plugin stores the API Key encrypted in the configuration files on disk and no longer transfers it to users viewing the configuration form in plain text.

Permalink: https://github.com/advisories/GHSA-3hw6-gc8h-9243
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0zaHc2LWdjOGgtOTI0M84AAWQT
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: about 2 years ago
Updated: 6 months ago


CVSS Score: 3.3
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Identifiers: GHSA-3hw6-gc8h-9243, CVE-2018-1999031
References: Repository: https://github.com/jenkinsci/meliora-testlab-plugin
Blast Radius: 1.0

Affected Packages

maven:org.jenkins-ci.plugins:meliora-testlab
Affected Version Ranges: <= 1.14
Fixed in: 1.15