{"api_version":"1","generated_at":"2026-04-22T17:46:48+00:00","cve":"CVE-2019-1003069","urls":{"html":"https://cve.report/CVE-2019-1003069","api":"https://cve.report/api/cve/CVE-2019-1003069.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2019-1003069","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2019-1003069"},"summary":{"title":"CVE-2019-1003069","description":"Jenkins Aqua Security Scanner Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.","state":"PUBLIC","assigner":"jenkinsci-cert@googlegroups.com","published_at":"2019-04-04 16:29:00","updated_at":"2023-10-25 18:16:00"},"problem_types":["CWE-311"],"metrics":[],"references":[{"url":"http://www.openwall.com/lists/oss-security/2019/04/12/2","name":"[oss-security] 20190413 Re: Multiple vulnerabilities in Jenkins plugins","refsource":"MLIST","tags":["Mailing List","Third Party Advisory"],"title":"oss-security - Re: Multiple vulnerabilities in Jenkins plugins","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://jenkins.io/security/advisory/2019-04-03/#SECURITY-949","name":"https://jenkins.io/security/advisory/2019-04-03/#SECURITY-949","refsource":"MISC","tags":["Vendor Advisory"],"title":"Jenkins Security Advisory 2019-04-03","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/107790","name":"107790","refsource":"BID","tags":["Third Party Advisory","VDB Entry"],"title":"Multiple Jenkins Plugins Multiple Input Validation Security Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2019-1003069","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-1003069","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2019","cve_id":"1003069","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jenkins","cpe5":"aqua_security_scanner","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"jenkins","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"1003069","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jenkins","cpe5":"aqua_security_scanner","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"jenkins","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2019-1003069","qid":"996816","title":"Java (Maven) Security Update for org.jenkins-ci.plugins:aqua-security-scanner (GHSA-3j3v-7f8f-v2xp)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2019-1003069","ASSIGNER":"jenkinsci-cert@googlegroups.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Jenkins Aqua Security Scanner Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Jenkins project","product":{"product_data":[{"product_name":"Jenkins Aqua Security Scanner Plugin","version":{"version_data":[{"version_affected":"=","version_value":"all versions as of 2019-04-03"}]}}]}}]}},"references":{"reference_data":[{"url":"http://www.securityfocus.com/bid/107790","refsource":"MISC","name":"http://www.securityfocus.com/bid/107790"},{"url":"http://www.openwall.com/lists/oss-security/2019/04/12/2","refsource":"MISC","name":"http://www.openwall.com/lists/oss-security/2019/04/12/2"},{"url":"https://jenkins.io/security/advisory/2019-04-03/#SECURITY-949","refsource":"MISC","name":"https://jenkins.io/security/advisory/2019-04-03/#SECURITY-949"}]}},"nvd":{"publishedDate":"2019-04-04 16:29:00","lastModifiedDate":"2023-10-25 18:16:00","problem_types":["CWE-311"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:jenkins:aqua_security_scanner:*:*:*:*:*:jenkins:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2019","CveId":"1003069","Ordinal":"148971","Title":"CVE-2019-1003069","CVE":"CVE-2019-1003069","Year":"2019"},"notes":[{"CveYear":"2019","CveId":"1003069","Ordinal":"1","NoteData":"Jenkins Aqua Security Scanner Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.","Type":"Description","Title":null},{"CveYear":"2019","CveId":"1003069","Ordinal":"2","NoteData":"2019-04-04","Type":"Other","Title":"Published"},{"CveYear":"2019","CveId":"1003069","Ordinal":"3","NoteData":"2020-06-23","Type":"Other","Title":"Modified"}]}}}