CVE-2018-1000610

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-1000610
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-1000610.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-1000610
Aliases
Published
2018-06-26T17:29:00Z
Modified
2024-09-03T02:01:32.914490Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A exposure of sensitive information vulnerability exists in Jenkins Configuration as Code Plugin 0.7-alpha and earlier in DataBoundConfigurator.java, Attribute.java, BaseConfigurator.java, ExtensionConfigurator.java that allows attackers with access to Jenkins log files to obtain the passwords configured using Configuration as Code Plugin.

References

Affected packages

Git / github.com/jenkinsci/configuration-as-code-plugin

Affected ranges

Type
GIT
Repo
https://github.com/jenkinsci/configuration-as-code-plugin
Events

Affected versions

configuration-as-code-0.*

configuration-as-code-0.1-alpha
configuration-as-code-0.2-alpha