An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1qZzI5LWMycWotd3BtM84AAivc
Jenkins Anchore Container Scanner Plugin vulnerable to Insufficiently Protected Credentials
Jenkins Anchore Container Image Scanner Plugin 1.0.19 and earlier stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
The credential being stored was a service password for the Anchore.io service. As the affected functionality has been deprecated, and the affected Anchore.io service has been shut down in late 2018, the affected feature has been removed.Permalink: https://github.com/advisories/GHSA-jg29-c2qj-wpm3
Source: GitHub Advisory Database
Published: about 1 year ago
Updated: 4 months ago
CVSS Score: 6.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Identifiers: GHSA-jg29-c2qj-wpm3, CVE-2019-16542
maven:org.jenkins-ci.plugins:anchore-container-scannerVersions: < 1.0.20
Fixed in: 1.0.20