Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1taHE2LWg5bTctd3E4Y84AAiIk
Jenkins Assembla Plugin has Insufficiently Protected Credentials
Assembla Plugin stores the Assembla password unencrypted in its global configuration file jenkins.plugin.assembla.AssemblaProjectProperty.xml
on the Jenkins controller. This password can be viewed by users with access to the Jenkins controller file system.
As of publication of this advisory, there is no fix.
Permalink: https://github.com/advisories/GHSA-mhq6-h9m7-wq8cJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1taHE2LWg5bTctd3E4Y84AAiIk
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: almost 2 years ago
Updated: about 1 year ago
CVSS Score: 3.3
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Identifiers: GHSA-mhq6-h9m7-wq8c, CVE-2019-10420
References:
- https://nvd.nist.gov/vuln/detail/CVE-2019-10420
- https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1543
- http://www.openwall.com/lists/oss-security/2019/09/25/3
- https://github.com/advisories/GHSA-mhq6-h9m7-wq8c
Affected Packages
maven:org.jenkins-ci.plugins:assembla
Affected Version Ranges: <= 1.4No known fixed version