CVE-2018-1000610 – io.jenkins:configuration-as-code
Package
Manager: maven
Name: io.jenkins:configuration-as-code
Vulnerable Version: >=0 <0.8-alpha
Severity
Level: High
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00054 pctl0.16654
Details
Jenkins Configuration as Code Plugin has Insufficiently Protected Credentials A exposure of sensitive information vulnerability exists in Jenkins Configuration as Code Plugin 0.7-alpha and earlier in DataBoundConfigurator.java, Attribute.java, BaseConfigurator.java, ExtensionConfigurator.java that allows attackers with access to Jenkins log files to obtain the passwords configured using Configuration as Code Plugin.
Metadata
Created: 2022-05-13T01:48:39Z
Modified: 2022-11-08T23:05:43Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-8486-h39x-cx2f/GHSA-8486-h39x-cx2f.json
CWE IDs: ["CWE-522"]
Alternative ID: GHSA-8486-h39x-cx2f
Finding: F035
Auto approve: 1