Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.jenkins-ci.plugins/credentials
  4. ›
  5. CVE-2019-10320

CVE-2019-10320: File and Directory Information Exposure

May 21, 2019 (updated June 11, 2019)

Jenkins Credentials Plugin allows users with permission to create or update credentials to confirm the existence of files on the Jenkins master with an attacker-specified path, and obtain the certificate content of files containing a PKCS#12 certificate.

References

  • jenkins.io/security/advisory/2019-05-21/
  • nvd.nist.gov/vuln/detail/CVE-2019-10320

Code Behaviors & Features

Detect and mitigate CVE-2019-10320 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 2.1.18

Fixed versions

  • 2.2

Solution

Upgrade to version 2.2 or above.

Impact 4.3 MEDIUM

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-538: Insertion of Sensitive Information into Externally-Accessible File or Directory

Source file

maven/org.jenkins-ci.plugins/credentials/CVE-2019-10320.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:07 +0000.