Jenkins Maven Release Plugin stores unencrypted credentials, allowing viewing by authorized users
Reporter | Title | Published | Views | Family All 6 |
---|---|---|---|---|
![]() | CVE-2019-10361 | 31 Jul 201913:15 | – | nvd |
![]() | Jenkins Maven Release Plug-in Plugin stored credentials in plain text | 24 May 202216:51 | – | osv |
![]() | CVE-2019-10361 | 31 Jul 201912:45 | – | cvelist |
![]() | Jenkins Maven Release Plug-in Plugin stored credentials in plain text | 24 May 202216:51 | – | github |
![]() | Design/Logic Flaw | 31 Jul 201913:15 | – | prion |
![]() | Jenkins Maven Release Cleartext Storage of Credentials Information Disclosure Vulnerability | 17 Sep 201900:00 | – | zdi |
[
{
"product": "Jenkins Maven Release Plugin",
"vendor": "Jenkins project",
"versions": [
{
"status": "affected",
"version": "0.14.0 and earlier"
}
]
}
]
Source | Link |
---|---|
zerodayinitiative | www.zerodayinitiative.com/advisories/ZDI-19-835/ |
openwall | www.openwall.com/lists/oss-security/2019/07/31/1 |
jenkins | www.jenkins.io/security/advisory/2019-07-31/ |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo