logo

CVE-2017-1000395 org.jenkins-ci.main:jenkins-core

Package

Manager: maven
Name: org.jenkins-ci.main:jenkins-core
Vulnerable Version: >=0 <2.73.2 || >=2.74 <2.84

Severity

Level: Medium

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00069 pctl0.21627

Details

Exposure of Sensitive Information to an Unauthorized Actor in Jenkins Jenkins 2.73.1 and earlier, 2.83 and earlier provides information about Jenkins user accounts which is generally available to anyone with Overall/Read permissions via the /user/(username)/api remote API. This included e.g. Jenkins users' email addresses if the Mailer Plugin is installed. The remote API now no longer includes information beyond the most basic (user ID and name) unless the user requesting it is a Jenkins administrator.

Metadata

Created: 2022-05-14T01:04:35Z
Modified: 2022-07-01T21:57:02Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-wqv4-9gr3-3qgh/GHSA-wqv4-9gr3-3qgh.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-wqv4-9gr3-3qgh
Finding: F038
Auto approve: 1