Description
A plaintext storage of a password vulnerability exists in Jenkins Coverity Plugin 1.10.0 and earlier in CIMInstance.java that allows an attacker with local file system access or control of a Jenkins administrator's web browser (e.g. malicious extension) to retrieve the configured keystore and private key passwords.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-3573 | A plaintext storage of a password vulnerability exists in Jenkins Coverity Plugin 1.10.0 and earlier in CIMInstance.java that allows an attacker with local file system access or control of a Jenkins administrator's web browser (e.g. malicious extension) to retrieve the configured keystore and private key passwords. |
Github GHSA |
GHSA-cghg-jcv6-4v5m | Jenkins Coverity Plugin has Insufficiently Protected Credentials |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-16T22:40:16.156Z
Reserved: 2018-03-13T00:00:00.000Z
Link: CVE-2018-1000104
No data.
Status : Modified
Published: 2018-03-13T13:29:00.357
Modified: 2024-11-21T03:39:39.140
Link: CVE-2018-1000104
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA