logo

CVE-2019-1003048 com.programmingresearch:prqa-plugin

Package

Manager: maven
Name: com.programmingresearch:prqa-plugin
Vulnerable Version: >=0 <3.1.2

Severity

Level: Low

CVSS v3.1: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00015 pctl0.01991

Details

Jenkins PRQA Plugin stored password in plain text Jenkins PRQA Plugin stored a password unencrypted in its global configuration file on the Jenkins controller. This password could be viewed by users with access to the Jenkins controller file system. The plugin now stores the password encrypted in the configuration files on disk.

Metadata

Created: 2022-05-13T01:15:11Z
Modified: 2023-10-26T14:23:27Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-mxmw-6qgj-h67x/GHSA-mxmw-6qgj-h67x.json
CWE IDs: ["CWE-311"]
Alternative ID: GHSA-mxmw-6qgj-h67x
Finding: F020
Auto approve: 1