Vulnerabilites related to jenkins - aws-device-farm
cve-2019-1003064
Vulnerability from cvelistv5
Published
2019-04-04 15:38
Modified
2024-08-05 03:07
Severity ?
EPSS score ?
Summary
Jenkins aws-device-farm Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/107790 | vdb-entry, x_refsource_BID | |
http://www.openwall.com/lists/oss-security/2019/04/12/2 | mailing-list, x_refsource_MLIST | |
https://jenkins.io/security/advisory/2019-04-03/#SECURITY-835 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Jenkins project | Jenkins aws-device-farm Plugin |
Version: all versions as of 2019-04-03 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T03:07:17.883Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "107790", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/107790", }, { name: "[oss-security] 20190413 Re: Multiple vulnerabilities in Jenkins plugins", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2019/04/12/2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-835", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Jenkins aws-device-farm Plugin", vendor: "Jenkins project", versions: [ { status: "affected", version: "all versions as of 2019-04-03", }, ], }, ], descriptions: [ { lang: "en", value: "Jenkins aws-device-farm Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.", }, ], providerMetadata: { dateUpdated: "2023-10-24T16:45:45.640Z", orgId: "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", shortName: "jenkins", }, references: [ { name: "107790", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/107790", }, { name: "[oss-security] 20190413 Re: Multiple vulnerabilities in Jenkins plugins", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2019/04/12/2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-835", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "jenkinsci-cert@googlegroups.com", ID: "CVE-2019-1003064", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Jenkins aws-device-farm Plugin", version: { version_data: [ { version_value: "all versions as of 2019-04-03", }, ], }, }, ], }, vendor_name: "Jenkins project", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Jenkins aws-device-farm Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-256", }, ], }, ], }, references: { reference_data: [ { name: "107790", refsource: "BID", url: "http://www.securityfocus.com/bid/107790", }, { name: "[oss-security] 20190413 Re: Multiple vulnerabilities in Jenkins plugins", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2019/04/12/2", }, { name: "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-835", refsource: "CONFIRM", url: "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-835", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", assignerShortName: "jenkins", cveId: "CVE-2019-1003064", datePublished: "2019-04-04T15:38:48", dateReserved: "2019-04-03T00:00:00", dateUpdated: "2024-08-05T03:07:17.883Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2019-04-04 16:29
Modified
2024-11-21 04:17
Severity ?
Summary
Jenkins aws-device-farm Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
References
▼ | URL | Tags | |
---|---|---|---|
jenkinsci-cert@googlegroups.com | http://www.openwall.com/lists/oss-security/2019/04/12/2 | Mailing List, Third Party Advisory | |
jenkinsci-cert@googlegroups.com | http://www.securityfocus.com/bid/107790 | Third Party Advisory, VDB Entry | |
jenkinsci-cert@googlegroups.com | https://jenkins.io/security/advisory/2019-04-03/#SECURITY-835 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2019/04/12/2 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/107790 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://jenkins.io/security/advisory/2019-04-03/#SECURITY-835 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
jenkins | aws-device-farm | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:jenkins:aws-device-farm:*:*:*:*:*:jenkins:*:*", matchCriteriaId: "CD9187CC-1635-4DFC-8933-D541871B9C55", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Jenkins aws-device-farm Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.", }, { lang: "es", value: "El plugin aws-device-farm de Jenkins almacena credenciales sin cifrar en su archivo de configuración global en el servidor maestro de Jenkins donde las credenciales pueden ser visualizadas por los usuarios con acceso al sistema de archivos maestro.", }, ], id: "CVE-2019-1003064", lastModified: "2024-11-21T04:17:50.383", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 4, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-04-04T16:29:00.947", references: [ { source: "jenkinsci-cert@googlegroups.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2019/04/12/2", }, { source: "jenkinsci-cert@googlegroups.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/107790", }, { source: "jenkinsci-cert@googlegroups.com", tags: [ "Vendor Advisory", ], url: "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-835", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2019/04/12/2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/107790", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-835", }, ], sourceIdentifier: "jenkinsci-cert@googlegroups.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-311", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }