#VU22251 Cleartext storage of sensitive information in Mattermost Notification - CVE-2019-10459
Published: October 24, 2019 / Updated: October 24, 2019
Vulnerability identifier: #VU22251
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2019-10459
CWE-ID: CWE-312
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
Mattermost Notification
Mattermost Notification
Software vendor:
Jenkins
Jenkins
Description
The vulnerability allows a remote user to view the password on the target system.
The vulnerability exists due to the affected software stores webhook URLs as part of its global configuration file "jenkins.plugins.mattermost.MattermostNotifier.xml" and job "config.xml" files on the Jenkins master. A remote authenticated user with Extended Read permission or access to the master file system can view these URLs.
The vulnerability exists due to the affected software stores webhook URLs as part of its global configuration file "jenkins.plugins.mattermost.MattermostNotifier.xml" and job "config.xml" files on the Jenkins master. A remote authenticated user with Extended Read permission or access to the master file system can view these URLs.
Remediation
Install updates from vendor's website.