CVE-2019-10412 – com.inedo.proget:inedo-proget
Package
Manager: maven
Name: com.inedo.proget:inedo-proget
Vulnerable Version: >=0 <1.3
Severity
Level: Low
CVSS v3.1: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00087 pctl0.26036
Details
Jenkins Inedo ProGet Plugin Plugin has Cleartext Transmission of Sensitive Information Inedo ProGet Plugin Plugin stores a service password in its global Jenkins configuration. While the password is stored encrypted on disk, it was transmitted in plain text as part of the configuration form. This could result in exposure of the password through browser extensions, cross-site scripting vulnerabilities, and similar situations. Inedo ProGet Plugin Plugin now encrypts the password transmitted to administrators viewing the global configuration form.
Metadata
Created: 2022-05-24T16:56:45Z
Modified: 2023-02-23T20:32:49Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-f6g8-pxvp-9328/GHSA-f6g8-pxvp-9328.json
CWE IDs: ["CWE-319"]
Alternative ID: GHSA-f6g8-pxvp-9328
Finding: F017
Auto approve: 1