Vulnerabilities > CVE-2013-5676 - Cryptographic Issues vulnerability in Sonarsource Jenkins Plugin

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
sonarsource
CWE-310
exploit available

Summary

The Jenkins Plugin for SonarQube 3.7 and earlier allows remote authenticated users to obtain sensitive information (cleartext passwords) by reading the value in the sonar.sonarPassword parameter from jenkins/configure.

Vulnerable Configurations

Part Description Count
Application
Sonarsource
2

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.

Exploit-Db

descriptionSonarQube Jenkins Plugin - Plain Text Password. CVE-2013-5676. Webapps exploit for php platform
idEDB-ID:30409
last seen2016-02-03
modified2013-12-18
published2013-12-18
reporterChristian Catalano
sourcehttps://www.exploit-db.com/download/30409/
titleSonarQube Jenkins Plugin - Plain Text Password

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/138333/sonarqube-disclose.txt
idPACKETSTORM:138333
last seen2016-12-05
published2016-08-13
reporterChristian Catalano
sourcehttps://packetstormsecurity.com/files/138333/SonarQube-Jenkins-Password-Disclosure.html
titleSonarQube Jenkins Password Disclosure

Seebug

bulletinFamilyexploit
descriptionNo description provided by source.
idSSV:83804
last seen2017-11-19
modified2014-07-01
published2014-07-01
reporterRoot
sourcehttps://www.seebug.org/vuldb/ssvid-83804
titleSonarQube Jenkins Plugin - Plain Text Password