logo

CVE-2019-10347 javagh.jenkins:mashup-portlets-plugin

Package

Manager: maven
Name: javagh.jenkins:mashup-portlets-plugin
Vulnerable Version: >=0 <1.1.0

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

EPSS: 0.0008 pctl0.24411

Details

Stored credentials unencrypted in Jenkins Mashup Portlets Plugin Jenkins Mashup Portlets Plugin stored credentials unencrypted on the Jenkins master where they can be viewed by users with access to the master file system.

Metadata

Created: 2022-05-24T16:50:03Z
Modified: 2023-12-14T15:44:18Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-9p5v-6p5f-f28h/GHSA-9p5v-6p5f-f28h.json
CWE IDs: ["CWE-522"]
Alternative ID: GHSA-9p5v-6p5f-f28h
Finding: F035
Auto approve: 1