Cleartext transmission of sensitive information in Aqua MicroScanner - CVE-2019-10427
Published: September 26, 2019
Aqua MicroScanner
Detailed vulnerability description
The vulnerability allows a remote attacker to view password on the target system.
The vulnerability exists due to the affected software stores a token credential in its global Jenkins configuration. While the token is stored encrypted on disk, it is transmitted in plain text as part of the configuration form. A remote attacker with ability to intercept network traffic can obtain credentials.