Git Plugin Exposure in Jenkins Allows Credential Theft
CVE-2017-1000092

7.5HIGH

Key Information:

Vendor
Jenkins
Status
Vendor
CVE Published:
5 October 2017

Summary

The Git Plugin in Jenkins is vulnerable due to improper input validation that can be exploited by an attacker. By crafting a malicious Jenkins URL, an adversary can trick a developer with the necessary job configuration permissions into executing a link. This causes the Jenkins Git client to inadvertently send sensitive username and password credentials to a server controlled by the attacker. As a result, without needing direct access to the Jenkins server, attackers can compromise user accounts, leading to potential data breaches and undermining the integrity of the software development lifecycle.

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.