ID CVE-2019-10361 Type cve Reporter cve@mitre.org Modified 2020-10-02T14:22:00
Description
Jenkins Maven Release Plugin 0.14.0 and earlier stored credentials unencrypted on the Jenkins master where they could be viewed by users with access to the master file system.
{"zdi": [{"lastseen": "2020-06-22T11:40:48", "bulletinFamily": "info", "cvelist": ["CVE-2019-10361"], "description": "This vulnerability allows local attackers to disclose sensitive information on affected installations of Jenkins Maven Release. Authentication is required to exploit this vulnerability. The specific flaw exists within the Maven Release plugin. The issue results from storing credentials in plaintext. An attacker can leverage this vulnerability to execute code in the context of the build process.", "edition": 1, "modified": "2019-06-22T00:00:00", "published": "2019-09-17T00:00:00", "id": "ZDI-19-835", "href": "https://www.zerodayinitiative.com/advisories/ZDI-19-835/", "title": "Jenkins Maven Release Cleartext Storage of Credentials Information Disclosure Vulnerability", "type": "zdi", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N"}}]}