logo

CVE-2019-10428 org.jenkins-ci.plugins:aqua-security-scanner

Package

Manager: maven
Name: org.jenkins-ci.plugins:aqua-security-scanner
Vulnerable Version: >=0 <3.0.18

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00087 pctl0.26021

Details

Jenkins Aqua Security Scanner Plugin showed plain text password in configuration form Jenkins Aqua Security Scanner Plugin 3.0.17 and earlier transmitted configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.

Metadata

Created: 2022-05-24T22:00:44Z
Modified: 2024-01-30T21:18:20Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-xp44-8vwr-xwmv/GHSA-xp44-8vwr-xwmv.json
CWE IDs: ["CWE-319"]
Alternative ID: GHSA-xp44-8vwr-xwmv
Finding: F017
Auto approve: 1