8.8

CVE-2018-1000610

A exposure of sensitive information vulnerability exists in Jenkins Configuration as Code Plugin 0.7-alpha and earlier in DataBoundConfigurator.java, Attribute.java, BaseConfigurator.java, ExtensionConfigurator.java that allows attackers with access to Jenkins log files to obtain the passwords configured using Configuration as Code Plugin.

Data is provided by the National Vulnerability Database (NVD)
JenkinsConfiguration As Code Version0.1 Updatealpha SwPlatformjenkins
JenkinsConfiguration As Code Version0.2 Updatealpha SwPlatformjenkins
JenkinsConfiguration As Code Version0.3 Updatealpha SwPlatformjenkins
JenkinsConfiguration As Code Version0.4 Updatealpha SwPlatformjenkins
JenkinsConfiguration As Code Version0.5 Updatealpha SwPlatformjenkins
JenkinsConfiguration As Code Version0.6 Updatealpha SwPlatformjenkins
JenkinsConfiguration As Code Version0.7 Updatealpha SwPlatformjenkins
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.05% 0.136
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 4 8 2.9
AV:N/AC:L/Au:S/C:P/I:N/A:N
CWE-522 Insufficiently Protected Credentials

The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.