Insufficiently Protected Credentials Affecting org.jenkins-ci.plugins:neoload-jenkins-plugin package, versions [,2.2.6)
Snyk CVSS
Attack Complexity
Low
Threat Intelligence
EPSS
0.51% (77th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGJENKINSCIPLUGINS-473759
- published 18 Oct 2019
- disclosed 16 Oct 2019
- credit David Fiser
Introduced: 16 Oct 2019
CVE-2019-10440 Open this link in a new tabHow to fix?
Upgrade org.jenkins-ci.plugins:neoload-jenkins-plugin
to version 2.2.6 or higher.
Overview
org.jenkins-ci.plugins:neoload-jenkins-plugin is an Automate API and Application Performance Testing plugin
Affected versions of this package are vulnerable to Insufficiently Protected Credentials. The plugin stored credentials unencrypted in its global configuration file and in job config.xml
files on the Jenkins master where they could be viewed by users with Extended Read
permission, or access to the master file system.