Published on October 16th, 2019 📆 | 4258 Views ⚑
0Extensive Testing Plugin on Jenkins config.xml weak encryption
CVSS Meta Temp Score | Current Exploit Price (β) |
---|---|
3.5 | $0-$5k |
A vulnerability, which was classified as problematic, has been found in Extensive Testing Plugin on Jenkins (Testing Software) (affected version not known). Affected by this issue is some unknown processing of the file config.xml. The manipulation with an unknown input leads to a weak encryption vulnerability (Credentials). Using CWE to declare the problem leads to CWE-311. Impacted is confidentiality.
The weakness was shared 10/16/2019 (oss-sec). The advisory is available at openwall.com. This vulnerability is handled as CVE-2019-10448 since 03/29/2019. Technical details are known, but there is no available exploit.
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
The entries 143522, 143523, 143524 and 143525 are related to this item.
Type
Name
VulDB Meta Base Score: 3.5
VulDB Meta Temp Score: 3.5
VulDB Base Score: β3.5
VulDB Temp Score: β3.5
VulDB Vector: π
VulDB Reliability: π
VulDB Base Score: π
VulDB Temp Score: π
VulDB Reliability: π
Class: Weak encryption / Credentials (CWE-311)
Local: Yes
Remote: No
Availability: π
Status: Not defined
Price Prediction: π
Current Price Estimation: π
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Threat: π
Adversaries: π
Geopolitics: π
Economy: π
Predictions: π
Remediation: πRecommended: no mitigation known
0-Day Time: π
03/29/2019 CVE assigned
10/16/2019 Advisory disclosed
10/16/2019 VulDB entry created
10/16/2019 VulDB last updateAdvisory: openwall.com
Confirmation: π
CVE: CVE-2019-10448 (π)
See also: π
Created: 10/16/2019 07:45 PM
Complete: π
Comments
Enable the mail alert feature now!
https://vuldb.com/?id.143534
No comments yet. Please log in to comment.