Sensitive Information Exposure in Jenkins GitHub Plugin
CVE-2018-1000600
8.8HIGH
Summary
A vulnerability exists in the Jenkins GitHub Plugin that allows an attacker to expose sensitive credentials. This issue arises from a flaw in the GitHubTokenCredentialsCreator.java file, where attackers can specify a URL along with credential IDs obtained through alternative means, thereby capturing credentials stored within Jenkins. It's crucial for users of affected versions to implement necessary security measures to prevent unauthorized access to sensitive information.
References
EPSS Score
94% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability Reserved
Vulnerability published