Advisory Details

September 17th, 2019

Jenkins testlink Cleartext Storage of Credentials Information Disclosure Vulnerability

ZDI-19-839
ZDI-CAN-8874

CVE ID CVE-2019-10378
CVSS SCORE 3.3, (AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)
AFFECTED VENDORS Jenkins
AFFECTED PRODUCTS testlink
VULNERABILITY DETAILS

This vulnerability allows local attackers to disclose sensitive information on affected installations of Jenkins testlink. Authentication is required to exploit this vulnerability.

The specific flaw exists within the testlink plugin. The issue results from storing credentials in plaintext. An attacker can leverage this vulnerability to execute code in the context of the build process.

ADDITIONAL DETAILS Jenkins has issued an update to correct this vulnerability. More details can be found at:
https://jenkins.io/security/advisory/2019-08-07/
DISCLOSURE TIMELINE
  • 2019-06-18 - Vulnerability reported to vendor
  • 2019-09-17 - Coordinated public release of advisory
CREDIT David Fiser (Trend Micro Team Nebula)
BACK TO ADVISORIES