Sensitive Information Exposure in Jenkins GitHub Authentication Plugin by Jenkins
CVE-2019-1003018

4.3MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
6 February 2019

Summary

An exposure of sensitive information issue exists in the Jenkins GitHub Authentication Plugin, affecting versions 0.29 and earlier. This vulnerability allows attackers with access to a Jenkins administrator's web browser or those who can manipulate the browser (for example, through a malicious extension) to access sensitive data, including the configured client secret, from the GithubSecurityRealm/config.jelly file. This poses a significant risk, as the compromised client secret can lead to unauthorized actions within the Jenkins environment.

Affected Version(s)

Jenkins GitHub Authentication Plugin 0.29 and earlier

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability Reserved

  • Vulnerability published

.