Password Exposure Vulnerability in Jenkins Credentials Binding Plugin
CVE-2018-1000057
4.3MEDIUM
Summary
The Credentials Binding Plugin for Jenkins versions 1.14 and earlier is vulnerable to a flaw that compromises password masking in build logs. When passwords are provided to build processes, the plugin masks these passwords to prevent unauthorized access. However, the way Jenkins transforms password values—such as replacing environment variable references—can lead to the exposure of values that, although not identical, might closely resemble the original passwords. These transformed values are not masked, potentially allowing unauthorized users to discern the original passwords. This creates a significant security risk for Jenkins users.
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved