CVE-2019-1003053: Jenkins HockeyApp Plugin stores credentials in plain text
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.30633%
CWE
Published
5/13/2022
Updated
1/30/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.plugins:hockeyapp | maven | <= 1.4.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from unencrypted credential storage in job config.xml
files. In Jenkins plugin development, credentials should be stored using the Secret
class or Credentials
API. The HockeyAppRecorder
class (or similar configuration class) likely contains getter methods that serialize sensitive fields like API tokens directly to XML without encryption. The high confidence for getApiToken()
aligns with credential-handling patterns in Jenkins vulnerabilities, while getAppId()
is included due to its association with credential context in HockeyApp
integrations.