Common vulnerabilities and Exposures (CVE)

Skip to main content

Required CVE Record Information

Description

Jenkins White Source Plugin 19.1.1 and earlier stores credentials unencrypted in its global configuration file and in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission (config.xml), or access to the master file system.

Product Status

Learn more

Versions 2 Total

Default Status: unknown

affected

unknown

Updated:

This container includes required additional information provided by the CVE Program for this vulnerability.