Jenkins Credentials Plugin 2.1.18 and earlier allowed users with permission to create or update credentials to confirm the existence of files on the Jenkins master with an attacker-specified path, and obtain the certificate content of files containing a PKCS#12 certificate.
References
Configurations
History
21 Nov 2024, 04:18
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2019/May/39 - | |
References | () http://www.openwall.com/lists/oss-security/2019/05/21/1 - | |
References | () http://www.securityfocus.com/bid/108462 - | |
References | () https://access.redhat.com/errata/RHBA-2019:1605 - | |
References | () https://access.redhat.com/errata/RHSA-2019:1636 - | |
References | () https://jenkins.io/security/advisory/2019-05-21/#SECURITY-1322 - Mitigation, Vendor Advisory | |
References | () https://wwws.nightwatchcybersecurity.com/2019/05/23/exploring-the-file-system-via-jenkins-credentials-plugin-vulnerability-cve-2019-10320/ - |
Information
Published : 2019-05-21 13:29
Updated : 2024-11-21 04:18
NVD link : CVE-2019-10320
Mitre link : CVE-2019-10320
CVE.ORG link : CVE-2019-10320
JSON object : View
Products Affected
jenkins
- credentials
CWE
CWE-538
Insertion of Sensitive Information into Externally-Accessible File or Directory