Learn about CVE-2019-10347 affecting Jenkins Mashup Portlets Plugin. Unencrypted credentials on Jenkins master pose security risks. Find mitigation steps here.
Jenkins Mashup Portlets Plugin stored credentials unencrypted on the Jenkins master, potentially exposing them to unauthorized users.
Understanding CVE-2019-10347
The vulnerability in the Jenkins Mashup Portlets Plugin allows users with access to the master file system to view stored credentials.
What is CVE-2019-10347?
The credentials for the Jenkins Mashup Portlets Plugin are stored without encryption on the Jenkins master, making them accessible to users who have access to the master file system.
The Impact of CVE-2019-10347
Technical Details of CVE-2019-10347
The following technical details provide insight into the vulnerability.
Vulnerability Description
The Jenkins Mashup Portlets Plugin stores credentials without encryption on the Jenkins master, allowing unauthorized access.
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Protecting systems from CVE-2019-10347 is crucial to maintaining security.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates