CVE-2019-10370: Insertion of Sensitive Information into Log File
(updated )
Jenkins Mask Passwords Plugin 2.12.0 and earlier transmits globally configured passwords in plain text as part of the configuration form, potentially resulting in their exposure.
References
- www.openwall.com/lists/oss-security/2019/08/07/1
- github.com/advisories/GHSA-gp67-c7j2-2qg2
- github.com/jenkinsci/mask-passwords-plugin/commit/aadefdbf319954cf0c5acbe032637e1c0a924f37
- github.com/jenkinsci/mask-passwords-plugin/pull/20
- jenkins.io/security/advisory/2019-08-07/
- nvd.nist.gov/vuln/detail/CVE-2019-10370
Detect and mitigate CVE-2019-10370 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →