CVE-2019-1003038

Source
https://nvd.nist.gov/vuln/detail/CVE-2019-1003038
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-1003038.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2019-1003038
Aliases
Published
2019-03-08T21:29:00Z
Modified
2024-09-03T02:21:12.988824Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An insufficiently protected credentials vulnerability exists in Jenkins Repository Connector Plugin 1.2.4 and earlier in src/main/java/org/jvnet/hudson/plugins/repositoryconnector/ArtifactDeployer.java, src/main/java/org/jvnet/hudson/plugins/repositoryconnector/Repository.java, src/main/java/org/jvnet/hudson/plugins/repositoryconnector/UserPwd.java that allows an attacker with local file system access or control of a Jenkins administrator's web browser (e.g. malicious extension) to retrieve the password stored in the plugin configuration.

References

Affected packages

Git / github.com/jenkinsci/repository-connector-plugin

Affected ranges

Type
GIT
Repo
https://github.com/jenkinsci/repository-connector-plugin
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

repository-connector-0.*

repository-connector-0.6.1
repository-connector-0.7.0
repository-connector-0.8.0
repository-connector-0.8.1
repository-connector-0.8.2

repository-connector-1.*

repository-connector-1.0.0
repository-connector-1.0.1
repository-connector-1.1.0
repository-connector-1.1.1
repository-connector-1.1.2
repository-connector-1.1.3
repository-connector-1.2.0
repository-connector-1.2.1
repository-connector-1.2.2
repository-connector-1.2.3
repository-connector-1.2.4