CVE-2018-1000609

CVSS v3.0 6.5 (Medium)
65% Progress
CVSS v2.0 4 (Medium)
40% Progress
EPSS 0.06 % (28th)
0.06% Progress
Affected Products 1
Advisories 2

A exposure of sensitive information vulnerability exists in Jenkins Configuration as Code Plugin 0.7-alpha and earlier in ConfigurationAsCode.java that allows attackers with Overall/Read access to obtain the YAML export of the Jenkins configuration.

Weaknesses
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE Status
PUBLISHED
CNA
MITRE
Published Date
2018-06-26 17:29:00
(6 years ago)
Updated Date
2018-08-23 16:48:08
(6 years ago)

Affected Products

Loading...
Loading...
Loading...

Configuration #1

    CPE23 From Up To
  Jenkins Configuration As Code 0.1 Alpha for Jenkins cpe:2.3:a:jenkins:configuration_as_code:0.1:alpha:*:*:*:jenkins
  Jenkins Configuration As Code 0.2 Alpha for Jenkins cpe:2.3:a:jenkins:configuration_as_code:0.2:alpha:*:*:*:jenkins
  Jenkins Configuration As Code 0.3 Alpha for Jenkins cpe:2.3:a:jenkins:configuration_as_code:0.3:alpha:*:*:*:jenkins
  Jenkins Configuration As Code 0.4 Alpha for Jenkins cpe:2.3:a:jenkins:configuration_as_code:0.4:alpha:*:*:*:jenkins
  Jenkins Configuration As Code 0.5 Alpha for Jenkins cpe:2.3:a:jenkins:configuration_as_code:0.5:alpha:*:*:*:jenkins
  Jenkins Configuration As Code 0.6 Alpha for Jenkins cpe:2.3:a:jenkins:configuration_as_code:0.6:alpha:*:*:*:jenkins
  Jenkins Configuration As Code 0.7 Alpha for Jenkins cpe:2.3:a:jenkins:configuration_as_code:0.7:alpha:*:*:*:jenkins
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...