Sensitive Information Exposure in Jenkins GitHub Plugin by CloudBees
CVE-2018-1000183

6.5MEDIUM

Key Information:

Vendor
Jenkins
Status
Vendor
CVE Published:
5 June 2018

Summary

A vulnerability in the Jenkins GitHub Plugin allows for the exposure of sensitive information. Attackers with Overall/Read access can connect to a maliciously crafted URL using specific credential IDs, enabling them to capture credentials stored within Jenkins. This could potentially compromise the security of the affected systems, highlighting the importance of updating to secure versions to protect against unauthorized access.

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.