A vulnerability in Jenkins ECS Publisher Plugin 1.0.0 and earlier allows attackers with Item/Extended Read permission, or local file system access to the Jenkins home directory to obtain the API token configured in this plugin's configuration.
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2019/03/28/2 | third party advisory mailing list |
http://www.securityfocus.com/bid/107628 | third party advisory vdb entry |
https://jenkins.io/security/advisory/2019-03-25/#SECURITY-846 | vendor advisory |