8.8
CVE-2018-1000610
- EPSS 0.05%
- Veröffentlicht 26.06.2018 17:29:00
- Zuletzt bearbeitet 21.11.2024 03:40:13
- Quelle cve@mitre.org
- Teams Watchlist Login
- Unerledigt Login
A exposure of sensitive information vulnerability exists in Jenkins Configuration as Code Plugin 0.7-alpha and earlier in DataBoundConfigurator.java, Attribute.java, BaseConfigurator.java, ExtensionConfigurator.java that allows attackers with access to Jenkins log files to obtain the passwords configured using Configuration as Code Plugin.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Jenkins ≫ Configuration As Code Version0.1 Updatealpha SwPlatformjenkins
Jenkins ≫ Configuration As Code Version0.2 Updatealpha SwPlatformjenkins
Jenkins ≫ Configuration As Code Version0.3 Updatealpha SwPlatformjenkins
Jenkins ≫ Configuration As Code Version0.4 Updatealpha SwPlatformjenkins
Jenkins ≫ Configuration As Code Version0.5 Updatealpha SwPlatformjenkins
Jenkins ≫ Configuration As Code Version0.6 Updatealpha SwPlatformjenkins
Jenkins ≫ Configuration As Code Version0.7 Updatealpha SwPlatformjenkins
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.05% | 0.136 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 4 | 8 | 2.9 |
AV:N/AC:L/Au:S/C:P/I:N/A:N
|
CWE-522 Insufficiently Protected Credentials
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.