Cleartext storage of sensitive information in Redgate SQL Change Automation - CVE-2019-16557

 

Cleartext storage of sensitive information in Redgate SQL Change Automation - CVE-2019-16557

Published: December 18, 2019


Vulnerability identifier: #VU23675
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2019-16557
CWE-ID: CWE-312
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Jenkins
Affected software:
Redgate SQL Change Automation

Detailed vulnerability description

The vulnerability allows a remote user to view the password on the target system.

The vulnerability exists due to the affected software stores credentials unencrypted in job "config.xml" files on the Jenkins master as part of its build step configuration. A remote user with Extended Read permission or access to the master file system can obtain credentials.

How to mitigate CVE-2019-16557

Install updates from vendor's website.

Sources