logo

CVE-2019-10452 org.jenkins-ci.plugins:view26

Package

Manager: maven
Name: org.jenkins-ci.plugins:view26
Vulnerable Version: >=0 <=1.0.7

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00023 pctl0.04466

Details

Jenkins View26 Test-Reporting Plugin stores access token in plain text Jenkins View26 Test-Reporting Plugin stores an access token unencrypted in job `config.xml` files on the Jenkins controller. This token can be viewed by users with Extended Read permission or access to the Jenkins controller file system. As of publication of this advisory there is no fix.

Metadata

Created: 2022-05-24T16:58:50Z
Modified: 2023-10-26T23:07:40Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-5rc5-4c5c-4cwx/GHSA-5rc5-4c5c-4cwx.json
CWE IDs: ["CWE-312"]
Alternative ID: GHSA-5rc5-4c5c-4cwx
Finding: F020
Auto approve: 1