A exposure of sensitive information vulnerability exists in Jenkins Configuration as Code Plugin 0.7-alpha and earlier in DataBoundConfigurator.java, Attribute.java, BaseConfigurator.java, ExtensionConfigurator.java that allows attackers with access to Jenkins log files to obtain the passwords configured using Configuration as Code Plugin.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-3100 | A exposure of sensitive information vulnerability exists in Jenkins Configuration as Code Plugin 0.7-alpha and earlier in DataBoundConfigurator.java, Attribute.java, BaseConfigurator.java, ExtensionConfigurator.java that allows attackers with access to Jenkins log files to obtain the passwords configured using Configuration as Code Plugin. |
Github GHSA |
GHSA-8486-h39x-cx2f | Jenkins Configuration as Code Plugin has Insufficiently Protected Credentials |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-17T02:11:28.974Z
Reserved: 2018-06-26T00:00:00Z
Link: CVE-2018-1000610
No data.
Status : Modified
Published: 2018-06-26T17:29:00.710
Modified: 2024-11-21T03:40:13.480
Link: CVE-2018-1000610
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA