CVE-2019-10320

medium

Description

Jenkins Credentials Plugin 2.1.18 and earlier allowed users with permission to create or update credentials to confirm the existence of files on the Jenkins master with an attacker-specified path, and obtain the certificate content of files containing a PKCS#12 certificate.

References

https://wwws.nightwatchcybersecurity.com/2019/05/23/exploring-the-file-system-via-jenkins-credentials-plugin-vulnerability-cve-2019-10320/

https://jenkins.io/security/advisory/2019-05-21/#SECURITY-1322

https://access.redhat.com/errata/RHSA-2019:1636

https://access.redhat.com/errata/RHBA-2019:1605

http://www.securityfocus.com/bid/108462

http://www.openwall.com/lists/oss-security/2019/05/21/1

http://seclists.org/fulldisclosure/2019/May/39

Details

Source: Mitre, NVD

Published: 2019-05-21

Updated: 2023-10-25

Risk Information

CVSS v2

Base Score: 4

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N

Severity: Medium

CVSS v3

Base Score: 4.3

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Severity: Medium