ASA-2019-00607 – Jenkins Sonar Gerrit Plugin: Stored credentials in plain text


Allele Security Alert

ASA-2019-00607

Identifier(s)

ASA-2019-00607, CVE-2019-10467, SECURITY-1003

Title

Stored credentials in plain text

Vendor(s)

Tatiana Didik (Goretskaya)

Aleksey Didik

Product(s)

Jenkins Sonar Gerrit Plugin

Affected version(s)

Jenkins Sonar Gerrit Plugin up to and including 2.3

Fixed version(s)

Unknown

Proof of concept

Unknown

Description

Credential unencrypted in job config.xml files on the Jenkins master if the ‘Override Credentials’ option is used. This credential can be viewed by users with Extended Read permission or access to the master file system.

Technical details

Unknown

Credits

Oleg Nenashev (CloudBees, Inc)

Reference(s)

Jenkins Security Advisory 2019-10-23
https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1003

Jenkins security advisory
https://groups.google.com/d/msg/jenkinsci-advisories/KCv6eDsiV3Y/GNr0aDC3AQAJ

oss-security – Multiple vulnerabilities in Jenkins plugins
https://www.openwall.com/lists/oss-security/2019/10/23/2

Jenkins Plugins
https://plugins.jenkins.io/sonar-gerrit

CVE-2019-10467
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10467

CVE-2019-10467
https://nvd.nist.gov/vuln/detail/CVE-2019-10467

If there is any error in this alert or you wish a comprehensive analysis, let us know.

Last modified: November 4, 2019

We are not responsible for any data loss, device corruption or any other type of issue due to the use of any information mentioned in our security alerts.