Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | N/A |
CWE-ID | CWE-312 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
ECS publisher Web applications / Modules and components for CMS |
Vendor | Jenkins |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU18069
Risk: Low
CVSSv3.1: 4.6 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]
CVE-ID: N/A
CWE-ID:
CWE-312 - Cleartext Storage of Sensitive Information
Exploit availability: No
DescriptionThe disclosed vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to application stores the API token unencrypted in jobs' config.xml
files and its global configuration file on the Jenkins master. A user with Extended Read permission or access to the master file system can obtain to the API token.
Install updates from vendor's website.
Vulnerable software versionsECS publisher: 1.0.0
External linkshttp://jenkins.io/security/advisory/2019-03-25/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.