{"api_version":"1","generated_at":"2026-04-22T17:46:00+00:00","cve":"CVE-2019-10316","urls":{"html":"https://cve.report/CVE-2019-10316","api":"https://cve.report/api/cve/CVE-2019-10316.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2019-10316","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2019-10316"},"summary":{"title":"CVE-2019-10316","description":"Jenkins Aqua MicroScanner Plugin 1.0.5 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.","state":"PUBLIC","assigner":"jenkinsci-cert@googlegroups.com","published_at":"2019-04-30 13:29:00","updated_at":"2023-10-25 18:16:00"},"problem_types":["CWE-522"],"metrics":[],"references":[{"url":"http://www.securityfocus.com/bid/108159","name":"108159","refsource":"BID","tags":["Third Party Advisory","VDB Entry"],"title":"Jenkins Multiple Security Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.openwall.com/lists/oss-security/2019/04/30/5","name":"[oss-security] 20190430 Multiple vulnerabilities in Jenkins plugins","refsource":"MLIST","tags":["Mailing List","Third Party Advisory"],"title":"oss-security - Multiple vulnerabilities in Jenkins plugins","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://jenkins.io/security/advisory/2019-04-30/#SECURITY-1380","name":"https://jenkins.io/security/advisory/2019-04-30/#SECURITY-1380","refsource":"MISC","tags":["Vendor Advisory"],"title":"Jenkins Security Advisory 2019-04-30","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2019-10316","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10316","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2019","cve_id":"10316","vulnerable":"1","versionEndIncluding":"1.0.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jenkins","cpe5":"aqua_microscanner","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"jenkins","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2019-10316","qid":"996047","title":"Java (Maven) Security Update for org.jenkins-ci.plugins:aqua-microscanner (GHSA-gg8r-24qm-qfch)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2019-10316","ASSIGNER":"jenkinsci-cert@googlegroups.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Jenkins Aqua MicroScanner Plugin 1.0.5 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Jenkins project","product":{"product_data":[{"product_name":"Jenkins Aqua MicroScanner Plugin","version":{"version_data":[{"version_affected":"=","version_value":"1.0.5 and earlier"}]}}]}}]}},"references":{"reference_data":[{"url":"http://www.openwall.com/lists/oss-security/2019/04/30/5","refsource":"MISC","name":"http://www.openwall.com/lists/oss-security/2019/04/30/5"},{"url":"http://www.securityfocus.com/bid/108159","refsource":"MISC","name":"http://www.securityfocus.com/bid/108159"},{"url":"https://jenkins.io/security/advisory/2019-04-30/#SECURITY-1380","refsource":"MISC","name":"https://jenkins.io/security/advisory/2019-04-30/#SECURITY-1380"}]}},"nvd":{"publishedDate":"2019-04-30 13:29:00","lastModifiedDate":"2023-10-25 18:16:00","problem_types":["CWE-522"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:jenkins:aqua_microscanner:*:*:*:*:*:jenkins:*:*","versionEndIncluding":"1.0.5","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2019","CveId":"10316","Ordinal":"148544","Title":"CVE-2019-10316","CVE":"CVE-2019-10316","Year":"2019"},"notes":[{"CveYear":"2019","CveId":"10316","Ordinal":"1","NoteData":"Jenkins Aqua MicroScanner Plugin 1.0.5 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.","Type":"Description","Title":null},{"CveYear":"2019","CveId":"10316","Ordinal":"2","NoteData":"2019-04-30","Type":"Other","Title":"Published"},{"CveYear":"2019","CveId":"10316","Ordinal":"3","NoteData":"2019-09-19","Type":"Other","Title":"Modified"}]}}}