Sensitive Information Exposure in Jenkins Configuration as Code Plugin
CVE-2018-1000609
6.5MEDIUM
Summary
A vulnerability in the Jenkins Configuration as Code Plugin allows users with Overall/Read access to exploit the system and retrieve sensitive information in the form of a YAML export of the Jenkins configuration, potentially exposing critical configurations and secrets.
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved