CVE-2019-10320
Severity CVSS v4.0:
Pending analysis
Type:
CWE-538
Insertion of Sensitive Information into Externally-Accessible File or Directory
Publication date:
21/05/2019
Last modified:
25/10/2023
Description
Jenkins Credentials Plugin 2.1.18 and earlier allowed users with permission to create or update credentials to confirm the existence of files on the Jenkins master with an attacker-specified path, and obtain the certificate content of files containing a PKCS#12 certificate.
Impact
Base Score 3.x
4.30
Severity 3.x
MEDIUM
Base Score 2.0
4.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:jenkins:credentials:*:*:*:*:*:jenkins:*:* | 2.1.18 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://seclists.org/fulldisclosure/2019/May/39
- http://www.openwall.com/lists/oss-security/2019/05/21/1
- http://www.securityfocus.com/bid/108462
- https://access.redhat.com/errata/RHBA-2019:1605
- https://access.redhat.com/errata/RHSA-2019:1636
- https://jenkins.io/security/advisory/2019-05-21/#SECURITY-1322
- https://wwws.nightwatchcybersecurity.com/2019/05/23/exploring-the-file-system-via-jenkins-credentials-plugin-vulnerability-cve-2019-10320/