CVE-2019-10350 – org.jenkins-ci.plugins:port-allocator
Package
Manager: maven
Name: org.jenkins-ci.plugins:port-allocator
Vulnerable Version: >=0 <=1.10
Severity
Level: Medium
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00088 pctl0.26064
Details
Jenkins Port Allocator Plugin stores credentials in plain text Jenkins Port Allocator Plugin stores credentials unencrypted in job `config.xml` files on the Jenkins controller. These credentials can be viewed by users with Extended Read permission, or access to the Jenkins controller file system. As of publication of this advisory, there is no fix.
Metadata
Created: 2022-05-24T16:50:04Z
Modified: 2023-10-26T22:29:25Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-5hhg-q22c-6g39/GHSA-5hhg-q22c-6g39.json
CWE IDs: ["CWE-312"]
Alternative ID: GHSA-5hhg-q22c-6g39
Finding: F020
Auto approve: 1