Jenkins NeoLoad Plugin 2.2.5 and earlier stored credentials unencrypted in its global configuration file and in job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-3329 | Jenkins NeoLoad Plugin 2.2.5 and earlier stored credentials unencrypted in its global configuration file and in job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system. |
Github GHSA |
GHSA-98p6-6428-77v7 | Jenkins NeoLoad Plugin stores credentials in cleartext |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-04T22:24:18.022Z
Reserved: 2019-03-29T00:00:00
Link: CVE-2019-10440
No data.
Status : Modified
Published: 2019-10-16T14:15:12.043
Modified: 2024-11-21T04:19:08.680
Link: CVE-2019-10440
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA