8.8
CVE-2018-1000610
- EPSS 0.05%
- Published 26.06.2018 17:29:00
- Last modified 21.11.2024 03:40:13
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
A exposure of sensitive information vulnerability exists in Jenkins Configuration as Code Plugin 0.7-alpha and earlier in DataBoundConfigurator.java, Attribute.java, BaseConfigurator.java, ExtensionConfigurator.java that allows attackers with access to Jenkins log files to obtain the passwords configured using Configuration as Code Plugin.
Data is provided by the National Vulnerability Database (NVD)
Jenkins ≫ Configuration As Code Version0.1 Updatealpha SwPlatformjenkins
Jenkins ≫ Configuration As Code Version0.2 Updatealpha SwPlatformjenkins
Jenkins ≫ Configuration As Code Version0.3 Updatealpha SwPlatformjenkins
Jenkins ≫ Configuration As Code Version0.4 Updatealpha SwPlatformjenkins
Jenkins ≫ Configuration As Code Version0.5 Updatealpha SwPlatformjenkins
Jenkins ≫ Configuration As Code Version0.6 Updatealpha SwPlatformjenkins
Jenkins ≫ Configuration As Code Version0.7 Updatealpha SwPlatformjenkins
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.05% | 0.136 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 4 | 8 | 2.9 |
AV:N/AC:L/Au:S/C:P/I:N/A:N
|
CWE-522 Insufficiently Protected Credentials
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.