Cleartext storage of sensitive information in QMetry for JIRA - Test Management - CVE-2019-16544

 

Cleartext storage of sensitive information in QMetry for JIRA - Test Management - CVE-2019-16544

Published: November 22, 2019


Vulnerability identifier: #VU22925
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2019-16544
CWE-ID: CWE-312
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Jenkins
Affected software:
QMetry for JIRA - Test Management

Detailed vulnerability description

The vulnerability allows a remote user to view the password on the target system.

The vulnerability exists due to the affected software stores credentials unencrypted in job "config.xml" files on the Jenkins master as part of its post-build step configuration. A remote user with Extended Read permission or access to the master file system can obtain this credential.

How to mitigate CVE-2019-16544

Install updates from vendor's website.

Sources