Unencrypted Storage of Credentials in Jenkins Assembla Auth Plugin

Unencrypted Storage of Credentials in Jenkins Assembla Auth Plugin

CVE-2019-10280 · HIGH Severity

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Jenkins Assembla Auth Plugin stores credentials unencrypted in the global config.xml configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

Learn more about our User Device Pen Test.