Jenkins Zulip Plugin 1.1.0 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-4135 | Jenkins Zulip Plugin 1.1.0 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system. |
Github GHSA |
GHSA-hfjr-m75m-wmh7 | Jenkins Zulip Plugin vulnerable to Insufficiently Protected Credentials |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-04T22:24:18.744Z
Reserved: 2019-03-29T00:00:00
Link: CVE-2019-10476
No data.
Status : Modified
Published: 2019-10-23T13:15:11.550
Modified: 2024-11-21T04:19:13.080
Link: CVE-2019-10476
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA