CVE-2019-10449:
Jenkins Fortify on Demand Plugin stores credentials in plain text
4.3
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
5/24/2022
Updated
12/22/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.plugins:fortify-on-demand-uploader | maven | <= 4.0.1 | 5.0.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from handling credentials as Strings instead of Jenkins' Secret type. The diff shows:
- Constructors previously accepted String-type credentials and passed them to shared components
- Getters returned plain Strings instead of Secrets
- The patch replaces String with Secret type and uses getEncryptedValue() These functions directly handled credential storage without encryption, matching the CWE-312 description of cleartext storage in config.xml files.