logo

CVE-2019-10348 org.jenkins-ci.plugins:gogs-webhook

Package

Manager: maven
Name: org.jenkins-ci.plugins:gogs-webhook
Vulnerable Version: >=0 <1.0.15

Severity

Level: Medium

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00088 pctl0.26064

Details

Jenkins Gogs Plugin stored credentials in plain text Jenkins Gogs Plugin stored credentials unencrypted in job `config.xml` files on the Jenkins controller. These credentials could be viewed by users with Extended Read permission, or access to the Jenkins controller file system. Gogs Plugin now stores credentials encrypted.

Metadata

Created: 2022-05-24T16:50:04Z
Modified: 2023-10-26T22:48:25Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-q736-rgcp-q443/GHSA-q736-rgcp-q443.json
CWE IDs: ["CWE-312"]
Alternative ID: GHSA-q736-rgcp-q443
Finding: F020
Auto approve: 1