Lucene search

K
cve[email protected]CVE-2018-1000609
HistoryOct 03, 2022 - 4:22 p.m.

CVE-2018-1000609

2022-10-0316:22:00
CWE-200
web.nvd.nist.gov
32
cve-2018-1000609
jenkins
configuration as code plugin
vulnerability
sensitive information
nvd

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

6.2 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.6%

A exposure of sensitive information vulnerability exists in Jenkins Configuration as Code Plugin 0.7-alpha and earlier in ConfigurationAsCode.java that allows attackers with Overall/Read access to obtain the YAML export of the Jenkins configuration.

Affected configurations

NVD
Node
jenkinsconfiguration_as_codeMatch0.1alphajenkins
OR
jenkinsconfiguration_as_codeMatch0.2alphajenkins
OR
jenkinsconfiguration_as_codeMatch0.3alphajenkins
OR
jenkinsconfiguration_as_codeMatch0.4alphajenkins
OR
jenkinsconfiguration_as_codeMatch0.5alphajenkins
OR
jenkinsconfiguration_as_codeMatch0.6alphajenkins
OR
jenkinsconfiguration_as_codeMatch0.7alphajenkins

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

6.2 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.6%

Related for CVE-2018-1000609