6.5
CVE-2019-1003045
- EPSS 0.69%
- Veröffentlicht 28.03.2019 18:29:00
- Zuletzt bearbeitet 21.11.2024 04:17:48
- Quelle jenkinsci-cert@googlegroups.co
- CVE-Watchlists
- Unerledigt
A vulnerability in Jenkins ECS Publisher Plugin 1.0.0 and earlier allows attackers with Item/Extended Read permission, or local file system access to the Jenkins home directory to obtain the API token configured in this plugin's configuration.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Trustsource ≫ Ecs Publisher SwPlatformjenkins Version <= 1.0.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.69% | 0.715 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
| nvd@nist.gov | 4 | 8 | 2.9 |
AV:N/AC:L/Au:S/C:P/I:N/A:N
|
CWE-522 Insufficiently Protected Credentials
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.