Description
An exposure of sensitive information vulnerability exists in Jenkins GitHub Authentication Plugin 0.29 and earlier in GithubSecurityRealm/config.jelly that allows attackers able to view a Jenkins administrator's web browser output, or control the browser (e.g. malicious extension) to retrieve the configured client secret.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-3138 | An exposure of sensitive information vulnerability exists in Jenkins GitHub Authentication Plugin 0.29 and earlier in GithubSecurityRealm/config.jelly that allows attackers able to view a Jenkins administrator's web browser output, or control the browser (e.g. malicious extension) to retrieve the configured client secret. |
Github GHSA |
GHSA-87pj-9q82-m9qh | GitHub Authentication Plugin showed plain text client secret in configuration form |
References
History
No history.
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-09-16T20:43:31.251Z
Reserved: 2019-02-06T00:00:00.000Z
Link: CVE-2019-1003018
No data.
Status : Modified
Published: 2019-02-06T16:29:00.890
Modified: 2024-11-21T04:17:44.970
Link: CVE-2019-1003018
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA