Vulnerability Details : CVE-2019-1003061
Jenkins jenkins-cloudformation-plugin Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
Exploit prediction scoring system (EPSS) score for CVE-2019-1003061
Probability of exploitation activity in the next 30 days: 0.22%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 59 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2019-1003061
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:N/A:N |
8.0
|
2.9
|
[email protected] |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
[email protected] |
CWE ids for CVE-2019-1003061
-
Storing a password in plaintext may result in a system compromise.Assigned by: [email protected] (Secondary)
-
The product does not encrypt sensitive or critical information before storage or transmission.Assigned by: [email protected] (Primary)
References for CVE-2019-1003061
-
http://www.securityfocus.com/bid/107790
Third Party Advisory;VDB Entry
-
https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1042
Vendor Advisory
-
http://www.openwall.com/lists/oss-security/2019/04/12/2
Mailing List;Third Party Advisory
Products affected by CVE-2019-1003061
- cpe:2.3:a:jenkins:jenkins-cloudformation-plugin:*:*:*:*:*:jenkins:*:*