Unencrypted Storage of Credentials in Jenkins aws-device-farm Plugin
CVE-2019-1003064 · HIGH Severity
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Jenkins aws-device-farm Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
Learn more about our Aws Audit.