SB2019112211 - Cleartext storage of sensitive information in Jenkins QMetry for JIRA - Test Management Plugin 



SB2019112211 - Cleartext storage of sensitive information in Jenkins QMetry for JIRA - Test Management Plugin

Published: November 22, 2019

Security Bulletin ID SB2019112211
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Cleartext storage of sensitive information (CVE-ID: CVE-2019-16544)

The vulnerability allows a remote user to view the password on the target system.

The vulnerability exists due to the affected software stores credentials unencrypted in job "config.xml" files on the Jenkins master as part of its post-build step configuration. A remote user with Extended Read permission or access to the master file system can obtain this credential.

Remediation

Install update from vendor's website.