Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | N/A |
CWE-ID | CWE-312 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
Codebeamer Test Results Trend Updater Web applications / Modules and components for CMS |
Vendor | Jenkins |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU18073
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: N/A
CWE-ID:
CWE-312 - Cleartext Storage of Sensitive Information
Exploit availability: No
DescriptionThe disclosed vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to application stores username and password in its configuration unencrypted in jobs' config.xml files on the Jenkins master.. A local user with with Extended Read permission or access to the master filesystem can obtain the password.
MitigationInstall updates from vendor's website.
Vulnerable software versionsCodebeamer Test Results Trend Updater: 1.0.1 - 1.1
External linkshttp://jenkins.io/security/advisory/2019-03-25/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.