Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1oZmpyLW03NW0td21oN84AAifN
Jenkins Zulip Plugin vulnerable to Insufficiently Protected Credentials
Jenkins Zulip Plugin prior to 1.1.1 stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.
Permalink: https://github.com/advisories/GHSA-hfjr-m75m-wmh7JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1oZmpyLW03NW0td21oN84AAifN
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 1 year ago
Updated: 8 months ago
CVSS Score: 7.8
CVSS vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-hfjr-m75m-wmh7, CVE-2019-10476
References:
- https://nvd.nist.gov/vuln/detail/CVE-2019-10476
- https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1621
- http://www.openwall.com/lists/oss-security/2019/10/23/2
- https://github.com/jenkinsci/zulip-plugin/releases/tag/1.1.1
- https://github.com/jenkinsci/zulip-plugin/commit/2a9dd6c41c2d913b0414d015b3118e3ddb60bd90
- https://github.com/advisories/GHSA-hfjr-m75m-wmh7
Affected Packages
maven:org.jenkins-ci.plugins:zulip
Versions: < 1.1.1Fixed in: 1.1.1