Skip to content

Jenkins Inedo BuildMaster Plugin showed plain text password in configuration form

Low severity GitHub Reviewed Published May 24, 2022 to the GitHub Advisory Database • Updated Oct 26, 2023

Package

maven com.inedo.proget:inedo-proget (Maven)

Affected versions

< 2.5.0

Patched versions

2.5.0

Description

Jenkins Inedo BuildMaster Plugin Plugin stores a service password in its global Jenkins configuration.

While the password is stored encrypted on disk, it was transmitted in plain text as part of the configuration form. This could result in exposure of the password through browser extensions, cross-site scripting vulnerabilities, and similar situations.

Inedo BuildMaster Plugin Plugin now encrypts the password transmitted to administrators viewing the global configuration form.

References

Published by the National Vulnerability Database Sep 25, 2019
Published to the GitHub Advisory Database May 24, 2022
Reviewed Oct 26, 2023
Last updated Oct 26, 2023

Severity

Low
3.1
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N

Weaknesses

CVE ID

CVE-2019-10411

GHSA ID

GHSA-pxv2-mfq7-vhp6
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.