Unencrypted Storage of Credentials in Jenkins Zulip Plugin

Unencrypted Storage of Credentials in Jenkins Zulip Plugin

CVE-2019-10476 · HIGH Severity

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Jenkins Zulip Plugin 1.1.0 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.

Learn more about our User Device Pen Test.