CVE-2019-10348 – org.jenkins-ci.plugins:gogs-webhook
Package
Manager: maven
Name: org.jenkins-ci.plugins:gogs-webhook
Vulnerable Version: >=0 <1.0.15
Severity
Level: Medium
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00088 pctl0.26064
Details
Jenkins Gogs Plugin stored credentials in plain text Jenkins Gogs Plugin stored credentials unencrypted in job `config.xml` files on the Jenkins controller. These credentials could be viewed by users with Extended Read permission, or access to the Jenkins controller file system. Gogs Plugin now stores credentials encrypted.
Metadata
Created: 2022-05-24T16:50:04Z
Modified: 2023-10-26T22:48:25Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-q736-rgcp-q443/GHSA-q736-rgcp-q443.json
CWE IDs: ["CWE-312"]
Alternative ID: GHSA-q736-rgcp-q443
Finding: F020
Auto approve: 1