Vulnerability Description
Jenkins Twitter Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jenkins | <= 0.7 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2019/04/30/5Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/108159Third Party AdvisoryVDB Entry
- https://jenkins.io/security/advisory/2019-04-30/#SECURITY-1143Vendor Advisory
- http://www.openwall.com/lists/oss-security/2019/04/30/5Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/108159Third Party AdvisoryVDB Entry
- https://jenkins.io/security/advisory/2019-04-30/#SECURITY-1143Vendor Advisory
FAQ
What is CVE-2019-10313?
CVE-2019-10313 is a vulnerability with a CVSS score of 8.8 (HIGH). Jenkins Twitter Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
How severe is CVE-2019-10313?
CVE-2019-10313 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-10313?
Check the references section above for vendor advisories and patch information. Affected products include: Jenkins Twitter.