cloudbees
[+] Credits: Joshua Platz aka Binary1985
[+] CVE ID: CVE-2019-11350
[+] Website: https://github.com/binary1985

[+] Source: https://github.com/binary1985/VulnerabilityDisclosure/blob/master/CloudBees%20Jenkins%20Operations%20Center%20Password%20Disclosure


Vendor:
==========================
https://www.cloudbees.com


Product:
===========
CloudBees Jenkins Operations Center
< Version 2.150.2.3

Jenkins and CloudBees. CloudBees is home to the original architects of Jenkins. JenkinsĀ® is the most popular open source automation server, with more than 165,000 active sites, globally, and over 1,650,000 users. It was initially developed by Kohsuke Kawaguchi in 2004.


Vulnerability Type:
==========================
Cleartext Password Storage 
Password Retrieval


Vulnerability Details:
=====================

Jenkins CloudBees stores Passwords unencrypted for maintaining  
the proxy server configuration. These credentials can be retrieved
when a trial expires when and the proxy configuration page is opened.
The credentials will then be embedded directly into the HTLM in cleartext.


1) Open the Jenkins CloudBees application of an expired trial license


2) Click Request Trial License


3) View the HTLM source code, extracting the username, and password from the HTLM form.

Key value name(html form ID's):
proxypass(cleartext)


Remediation Details:
=====================
The vendor is preparing a patch.

2019-04-15 - Issue Reported to Vendor
2019-04-15 - CVE Requested
2019-04-19 - CVE-2019-11350 Issued
2019-05-06 - Vendor Confirmed Vulnerability (PRODSEC-52)
2019-07-08 - Vendor Patched Vulnerability (https://release-notes.cloudbees.com/release/21/8.18)

[+] Disclaimer
The information contained within this advisory is supplied "as-is" with no
warranties or guarantees of fitness of use or otherwise.
Permission is hereby granted for the redistribution of this advisory,
provided that it is not altered except by reformatting it, and
that due credit is given. Permission is explicitly given for insertion in
vulnerability databases and similar, provided that due credit
is given to the author. The author is not responsible for any misuse of the
information contained herein and accepts no responsibility
for any damage caused by the use or misuse of this information. The author
prohibits any malicious use of security related information
or exploits by the author or elsewhere.

Binary1985