CVE-2018-1000169 – org.jenkins-ci.main:jenkins-core
Package
Manager: maven
Name: org.jenkins-ci.main:jenkins-core
Vulnerable Version: >=0 <2.107.2 || >=2.108 <2.116
Severity
Level: Medium
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00094 pctl0.27199
Details
Exposure of Sensitive Information to an Unauthorized Actor in Jenkins An exposure of sensitive information vulnerability exists in Jenkins 2.115 and older, LTS 2.107.1 and older, in CLICommand.java and ViewOptionHandler.java that allows unauthorized attackers to confirm the existence of agents or views with an attacker-specified name by sending a CLI command to Jenkins.
Metadata
Created: 2022-05-14T00:55:17Z
Modified: 2022-06-30T17:52:31Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-cpw3-x7gf-p872/GHSA-cpw3-x7gf-p872.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-cpw3-x7gf-p872
Finding: F038
Auto approve: 1