CVE-2017-1000395 – org.jenkins-ci.main:jenkins-core
Package
Manager: maven
Name: org.jenkins-ci.main:jenkins-core
Vulnerable Version: >=0 <2.73.2 || >=2.74 <2.84
Severity
Level: Medium
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00069 pctl0.21627
Details
Exposure of Sensitive Information to an Unauthorized Actor in Jenkins Jenkins 2.73.1 and earlier, 2.83 and earlier provides information about Jenkins user accounts which is generally available to anyone with Overall/Read permissions via the /user/(username)/api remote API. This included e.g. Jenkins users' email addresses if the Mailer Plugin is installed. The remote API now no longer includes information beyond the most basic (user ID and name) unless the user requesting it is a Jenkins administrator.
Metadata
Created: 2022-05-14T01:04:35Z
Modified: 2022-07-01T21:57:02Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-wqv4-9gr3-3qgh/GHSA-wqv4-9gr3-3qgh.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-wqv4-9gr3-3qgh
Finding: F038
Auto approve: 1