#VU22925 Cleartext storage of sensitive information in QMetry for JIRA - Test Management - CVE-2019-16544
Published: November 22, 2019
Vulnerability identifier: #VU22925
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2019-16544
CWE-ID: CWE-312
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
QMetry for JIRA - Test Management
QMetry for JIRA - Test Management
Software vendor:
Jenkins
Jenkins
Description
The vulnerability allows a remote user to view the password on the target system.
The vulnerability exists due to the affected software stores credentials unencrypted in job "config.xml" files on the Jenkins master as part of its post-build step configuration. A remote user with Extended Read permission or access to the master file system can obtain this credential.
The vulnerability exists due to the affected software stores credentials unencrypted in job "config.xml" files on the Jenkins master as part of its post-build step configuration. A remote user with Extended Read permission or access to the master file system can obtain this credential.
Remediation
Install updates from vendor's website.