ASA-2019-00607 – Jenkins Sonar Gerrit Plugin: Stored credentials in plain text

Credential unencrypted in job config.xml files on the Jenkins master if the 'Override Credentials' option is used. This credential can be viewed by users with Extended Read permission or access to the master file system.

ASA-2019-00601 – Jenkins Dynatrace Application Monitoring Plugin: Stored credentials in plain text

Dynatrace Application Monitoring Plugin stored a credential unencrypted in its global configuration file com.dynatrace.jenkins.dashboard.TAGlobalConfiguration.xml on the Jenkins master. This credential could be viewed by users with access to the master file system.

ASA-2019-00600 – Jenkins Zulip Plugin: Stored credentials in plain text

Zulip Plugin stored a credential unencrypted in its global configuration file jenkins.plugins.zulip.ZulipNotifier.xml, as well as in the legacy configuration file hudson.plugins.humbug.HumbugNotifier.xml on the Jenkins master. This credential could be viewed by users with access to the master file system.

ASA-2019-00599 – Jenkins Bitbucket OAuth Plugin: Stored credentials in plain text

Bitbucket OAuth Plugin stored a credential unencrypted in the global config.xml configuration file on the Jenkins master. This credential could be viewed by users with access to the master file system. Bitbucket OAuth Plugin now stores this credential encrypted.

ASA-2019-00598 – Jenkins Mattermost Notification Plugin: Stored webhook endpoint token in plain text

Mattermost allows the definition of incoming (from the perspective of the service) webhook URLs. These contain what is effectively a secret token as part of the URL. Mattermost Notification Plugin stored these webhook URLs as part of its global configuration file jenkins.plugins.mattermost.MattermostNotifier.xml and job config.xml files on the Jenkins master. These URLs could be viewed by users with Extended Read permission (in the case of job config.xml files) or access to the master file system.