Unencrypted Storage of Credentials in Jenkins aws-device-farm Plugin

Unencrypted Storage of Credentials in Jenkins aws-device-farm Plugin

CVE-2019-1003064 · HIGH Severity

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Jenkins aws-device-farm Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

Learn more about our Aws Audit.