Insufficiently Protected Credentials Affecting org.jenkins-ci.plugins:view26 package, versions [0,]


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (26th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGJENKINSCIPLUGINS-473761
  • published18 Oct 2019
  • disclosed16 Oct 2019
  • creditDavid Fiser

Introduced: 16 Oct 2019

CVE-2019-10452  (opens in a new tab)
CWE-319  (opens in a new tab)

How to fix?

There is no fixed version for org.jenkins-ci.plugins:view26.

Overview

org.jenkins-ci.plugins:view26 is an add-on will collect JUnit test results from your builds and submit them as Test Runs and Test Logs to VIEW26.

Affected versions of this package are vulnerable to Insufficiently Protected Credentials. The plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVSS Scores

version 3.1