ID CVE-2019-10291
Type cve
Reporter cve@mitre.org
Modified 2020-10-02T14:47:00
Description
Jenkins Netsparker Cloud Scan Plugin 1.1.5 and older stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.
{"id": "CVE-2019-10291", "bulletinFamily": "NVD", "title": "CVE-2019-10291", "description": "Jenkins Netsparker Cloud Scan Plugin 1.1.5 and older stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.", "published": "2019-04-04T16:29:00", "modified": "2020-10-02T14:47:00", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10291", "reporter": "cve@mitre.org", "references": ["http://www.openwall.com/lists/oss-security/2019/04/12/2", "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1040", "http://www.securityfocus.com/bid/107790"], "cvelist": ["CVE-2019-10291"], "type": "cve", "lastseen": "2020-12-09T21:41:37", "edition": 6, "viewCount": 2, "enchantments": {"dependencies": {"references": [], "modified": "2020-12-09T21:41:37", "rev": 2}, "score": {"value": 2.8, "vector": "NONE", "modified": "2020-12-09T21:41:37", "rev": 2}, "vulnersScore": 2.8}, "cpe": ["cpe:/a:jenkins:netsparker_cloud_scan:1.1.5"], "affectedSoftware": [{"cpeName": "jenkins:netsparker_cloud_scan", "name": "jenkins netsparker cloud scan", "operator": "le", "version": "1.1.5"}], "cvss2": {"acInsufInfo": false, "cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false}, "cvss3": {"cvssV3": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 5.9}, "cpe23": ["cpe:2.3:a:jenkins:netsparker_cloud_scan:1.1.5:*:*:*:*:jenkins:*:*"], "cwe": ["CWE-522"], "scheme": null, "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:a:jenkins:netsparker_cloud_scan:1.1.5:*:*:*:*:jenkins:*:*", "versionEndIncluding": "1.1.5", "vulnerable": true}], "operator": "OR"}]}}
{}