CVE-2019-10291:
Jenkins Netsparker Enterprise Scan Plugin stored credentials in plain text
3.3
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
5/13/2022
Updated
10/26/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.plugins:netsparker-cloud-scan | maven | <= 1.1.5 | 1.1.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from plaintext storage of API tokens in Jenkins configuration files. Key evidence comes from:
- ScanRequestBase's auth header generation directly using the API token string pre-patch
- DescriptorImpl.configure() handling unencrypted token storage in global config
- NCScanBuilder's setter accepting raw strings before Secret conversion These functions collectively handled credential processing/storage without encryption prior to the security fix.