Sensitive Information Exposure in Jenkins GitHub Authentication Plugin by Jenkins
CVE-2019-1003018
4.3MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 6 February 2019
Summary
An exposure of sensitive information issue exists in the Jenkins GitHub Authentication Plugin, affecting versions 0.29 and earlier. This vulnerability allows attackers with access to a Jenkins administrator's web browser or those who can manipulate the browser (for example, through a malicious extension) to access sensitive data, including the configured client secret, from the GithubSecurityRealm/config.jelly file. This poses a significant risk, as the compromised client secret can lead to unauthorized actions within the Jenkins environment.
Affected Version(s)
Jenkins GitHub Authentication Plugin 0.29 and earlier
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability Reserved
Vulnerability published