CVE-2019-10347 – javagh.jenkins:mashup-portlets-plugin
Package
Manager: maven
Name: javagh.jenkins:mashup-portlets-plugin
Vulnerable Version: >=0 <1.1.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
EPSS: 0.0008 pctl0.24411
Details
Stored credentials unencrypted in Jenkins Mashup Portlets Plugin Jenkins Mashup Portlets Plugin stored credentials unencrypted on the Jenkins master where they can be viewed by users with access to the master file system.
Metadata
Created: 2022-05-24T16:50:03Z
Modified: 2023-12-14T15:44:18Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-9p5v-6p5f-f28h/GHSA-9p5v-6p5f-f28h.json
CWE IDs: ["CWE-522"]
Alternative ID: GHSA-9p5v-6p5f-f28h
Finding: F035
Auto approve: 1