Vulnerability Description
Jenkins Aqua Security Scanner Plugin 3.0.17 and earlier transmitted configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jenkins | Aqua Security Scanner | <= 3.0.17 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2019/09/25/3Mailing ListThird Party Advisory
- https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1508Vendor Advisory
- http://www.openwall.com/lists/oss-security/2019/09/25/3Mailing ListThird Party Advisory
- https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1508Vendor Advisory
FAQ
What is CVE-2019-10428?
CVE-2019-10428 is a vulnerability with a CVSS score of 7.5 (HIGH). Jenkins Aqua Security Scanner Plugin 3.0.17 and earlier transmitted configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.
How severe is CVE-2019-10428?
CVE-2019-10428 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-10428?
Check the references section above for vendor advisories and patch information. Affected products include: Jenkins Aqua Security Scanner.