Information Exposure Affecting org.jenkins-ci.plugins:gogs-webhook package, versions [,1.0.15)
Snyk CVSS
Attack Complexity
Low
Threat Intelligence
EPSS
1.13% (85th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGJENKINSCIPLUGINS-451618
- published 16 Jul 2019
- disclosed 11 Jul 2019
- credit David Fiser of Trend Micro Nebula
Introduced: 11 Jul 2019
CVE-2019-10348 Open this link in a new tabHow to fix?
Upgrade org.jenkins-ci.plugins:gogs-webhook
to version 1.0.15 or higher.
Overview
org.jenkins-ci.plugins:gogs-webhook is a plugin that integrates Gogs to Jenkins.
Affected versions of this package are vulnerable to Information Exposure. The plugin stores credentials unencrypted in job config.xml
files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.