logo

CVE-2019-10411 com.inedo.proget:inedo-proget

Package

Manager: maven
Name: com.inedo.proget:inedo-proget
Vulnerable Version: >=0 <2.5.0

Severity

Level: Low

CVSS v3.1: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00087 pctl0.26036

Details

Jenkins Inedo BuildMaster Plugin showed plain text password in configuration form Jenkins Inedo BuildMaster Plugin Plugin stores a service password in its global Jenkins configuration. While the password is stored encrypted on disk, it was transmitted in plain text as part of the configuration form. This could result in exposure of the password through browser extensions, cross-site scripting vulnerabilities, and similar situations. Inedo BuildMaster Plugin Plugin now encrypts the password transmitted to administrators viewing the global configuration form.

Metadata

Created: 2022-05-24T16:56:45Z
Modified: 2023-10-26T23:03:41Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-pxv2-mfq7-vhp6/GHSA-pxv2-mfq7-vhp6.json
CWE IDs: ["CWE-319"]
Alternative ID: GHSA-pxv2-mfq7-vhp6
Finding: F332
Auto approve: 1