Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1qZzI5LWMycWotd3BtM84AAivc
Jenkins Anchore Container Scanner Plugin vulnerable to Insufficiently Protected Credentials
Jenkins Anchore Container Image Scanner Plugin 1.0.19 and earlier stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
The credential being stored was a service password for the Anchore.io service. As the affected functionality has been deprecated, and the affected Anchore.io service has been shut down in late 2018, the affected feature has been removed.
Permalink: https://github.com/advisories/GHSA-jg29-c2qj-wpm3JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1qZzI5LWMycWotd3BtM84AAivc
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: over 1 year ago
CVSS Score: 6.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Identifiers: GHSA-jg29-c2qj-wpm3, CVE-2019-16542
References:
- https://nvd.nist.gov/vuln/detail/CVE-2019-16542
- https://jenkins.io/security/advisory/2019-11-21/#SECURITY-1539
- http://www.openwall.com/lists/oss-security/2019/11/21/1
- https://github.com/advisories/GHSA-jg29-c2qj-wpm3
Affected Packages
maven:org.jenkins-ci.plugins:anchore-container-scanner
Affected Version Ranges: < 1.0.20Fixed in: 1.0.20