ID CVE-2019-10320
Summary Jenkins Credentials Plugin 2.1.18 and earlier allowed users with permission to create or update credentials to confirm the existence of files on the Jenkins master with an attacker-specified path, and obtain the certificate content of files containing a PKCS#12 certificate.
References
Vulnerable Configurations
  • cpe:2.3:a:jenkins:credentials:-:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:-:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.1:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.1:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.2:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.2:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.3:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.3:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.3.1:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.3.1:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.4:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.4:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.5:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.5:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.6:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.6:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.7:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.7:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.7.1:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.7.1:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.7.2:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.7.2:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.7.3:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.7.3:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.7.4:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.7.4:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.7.5:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.7.5:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.7.6:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.7.6:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.8:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.8:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.8.1:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.8.1:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.8.2:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.8.2:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.8.3:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.8.3:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.8.4:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.8.4:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.9:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.9:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.9.1:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.9.1:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.9.2:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.9.2:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.9.3:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.9.3:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.9.4:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.9.4:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.10:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.10:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.11:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.11:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.12:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.12:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.13:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.13:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.14:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.14:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.15:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.15:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.16:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.16:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.16.1:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.16.1:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.17:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.17:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.18:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.18:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.19:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.19:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.20:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.20:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.21:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.21:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.22:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.22:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.23:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.23:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.24:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.24:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.25:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.25:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.26:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.26:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.27:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.27:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:1.28:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:1.28:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:2.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:2.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:2.0.1:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:2.0.1:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:2.0.2:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:2.0.2:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:2.0.3:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:2.0.3:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:2.0.4:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:2.0.4:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:2.0.5:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:2.0.5:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:2.0.6:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:2.0.6:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:2.0.7:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:2.0.7:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:2.1.0:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:2.1.0:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:2.1.1:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:2.1.1:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:2.1.2:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:2.1.2:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:2.1.3:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:2.1.3:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:2.1.4:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:2.1.4:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:2.1.5:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:2.1.5:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:2.1.6:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:2.1.6:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:2.1.7:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:2.1.7:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:2.1.8:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:2.1.8:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:2.1.9:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:2.1.9:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:2.1.10:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:2.1.10:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:2.1.11:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:2.1.11:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:2.1.12:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:2.1.12:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:2.1.13:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:2.1.13:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:2.1.14:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:2.1.14:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:2.1.15:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:2.1.15:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:2.1.16:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:2.1.16:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:2.1.17:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:2.1.17:*:*:*:*:jenkins:*:*
  • cpe:2.3:a:jenkins:credentials:2.1.18:*:*:*:*:jenkins:*:*
    cpe:2.3:a:jenkins:credentials:2.1.18:*:*:*:*:jenkins:*:*
CVSS
Base: 4.0 (as of 25-10-2023 - 18:16)
Impact:
Exploitability:
CWE CWE-538
CAPEC
  • WSDL Scanning
    This attack targets the WSDL interface made available by a web service. The attacker may scan the WSDL interface to reveal sensitive information about invocation patterns, underlying technology implementations and associated vulnerabilities. This type of probing is carried out to perform more serious attacks (e.g. parameter tampering, malicious content injection, command injection, etc.). WSDL files provide detailed information about the services ports and bindings available to consumers. For instance, the attacker can submit special characters or malicious content to the Web service and can cause a denial of service condition or illegal access to database records. In addition, the attacker may try to guess other private methods by using the information provided in the WSDL files.
Access
VectorComplexityAuthentication
NETWORK LOW SINGLE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:S/C:P/I:N/A:N
redhat via4
advisories
  • rhsa
    id RHBA-2019:1605
  • rhsa
    id RHSA-2019:1636
rpms
  • atomic-enterprise-service-catalog-1:3.11.117-1.git.1.376e432.el7
  • atomic-enterprise-service-catalog-svcat-1:3.11.117-1.git.1.376e432.el7
  • atomic-openshift-cluster-autoscaler-0:3.11.117-1.git.1.caa79fa.el7
  • atomic-openshift-descheduler-0:3.11.117-1.git.1.1635b0a.el7
  • atomic-openshift-dockerregistry-0:3.11.117-1.git.1.6a42b08.el7
  • atomic-openshift-metrics-server-0:3.11.117-1.git.1.319d58e.el7
  • atomic-openshift-node-problem-detector-0:3.11.117-1.git.1.0345fe3.el7
  • atomic-openshift-service-idler-0:3.11.117-1.git.1.887bb82.el7
  • atomic-openshift-web-console-0:3.11.117-1.git.1.be7a05c.el7
  • cri-o-0:1.11.14-1.rhaos3.11.gitd56660e.el7
  • cri-o-debuginfo-0:1.11.14-1.rhaos3.11.gitd56660e.el7
  • golang-github-openshift-oauth-proxy-0:3.11.117-1.git.1.2b006d2.el7
  • jenkins-0:2.164.2.1555422716-1.el7
  • jenkins-2-plugins-0:3.11.1559667994-1.el7
  • openshift-ansible-0:3.11.123-1.git.0.db681ba.el7
  • openshift-ansible-docs-0:3.11.123-1.git.0.db681ba.el7
  • openshift-ansible-playbooks-0:3.11.123-1.git.0.db681ba.el7
  • openshift-ansible-roles-0:3.11.123-1.git.0.db681ba.el7
  • openshift-ansible-test-0:3.11.123-1.git.0.db681ba.el7
  • openshift-enterprise-autoheal-0:3.11.117-1.git.1.ef32a58.el7
  • openshift-enterprise-cluster-capacity-0:3.11.117-1.git.1.6593fce.el7
  • prometheus-0:3.11.117-1.git.1.f52d417.el7
  • prometheus-alertmanager-0:3.11.117-1.git.1.207ef35.el7
  • prometheus-node-exporter-0:3.11.117-1.git.1.dcee33f.el7
  • jenkins-2-plugins-0:4.1.1561471763-1.el7
refmap via4
bid 108462
confirm https://jenkins.io/security/advisory/2019-05-21/#SECURITY-1322
fulldisc 20190524 Exploring the File System via Jenkins Credentials Plugin Vulnerability - CVE-2019-10320
misc https://wwws.nightwatchcybersecurity.com/2019/05/23/exploring-the-file-system-via-jenkins-credentials-plugin-vulnerability-cve-2019-10320/
mlist [oss-security] 20190521 Multiple vulnerabilities in Jenkins plugins
Last major update 25-10-2023 - 18:16
Published 21-05-2019 - 13:29
Last modified 25-10-2023 - 18:16
Back to Top