Insufficiently Protected Credentials Affecting com.datatheorem.mobileappsecurity.jenkins.plugin:datatheorem-mobile-app-security Open this link in a new tab package, versions [,1.4.0)
Attack Complexity
Low
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications-
snyk-id
SNYK-JAVA-COMDATATHEOREMMOBILEAPPSECURITYJENKINSPLUGIN-469199
-
published
26 Sep 2019
-
disclosed
25 Sep 2019
-
credit
James Holderness, IB Boost
Introduced: 25 Sep 2019
CVE-2019-10413 Open this link in a new tabHow to fix?
Upgrade com.datatheorem.mobileappsecurity.jenkins.plugin:datatheorem-mobile-app-security
to version 1.4.0 or higher.
Overview
com.datatheorem.mobileappsecurity.jenkins.plugin:datatheorem-mobile-app-security is a Jenkins plugin to automatically upload builds to Data Theorem.
Affected versions of this package are vulnerable to Insufficiently Protected Credentials. The plugin stores credentials unencrypted in job config.xml
files on the Jenkins master where they could be viewed by users with Extended Read
permission, or access to the master file system.