Skip to content

Jenkins Configuration as Code Plugin vulnerable to Exposure of Sensitive Information

Moderate severity GitHub Reviewed Published May 14, 2022 to the GitHub Advisory Database • Updated Jan 29, 2023

Package

maven io.jenkins:configuration-as-code (Maven)

Affected versions

< 0.8-alpha

Patched versions

0.8-alpha

Description

A exposure of sensitive information vulnerability exists in Jenkins Configuration as Code Plugin 0.7-alpha and earlier in ConfigurationAsCode.java that allows attackers with Overall/Read access to obtain the YAML export of the Jenkins configuration. Version 0.8-alpha contains a fix for this issue.

References

Published by the National Vulnerability Database Jun 26, 2018
Published to the GitHub Advisory Database May 14, 2022
Reviewed Nov 8, 2022
Last updated Jan 29, 2023

Severity

Moderate
6.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

EPSS score

0.065%
(29th percentile)

Weaknesses

CVE ID

CVE-2018-1000609

GHSA ID

GHSA-393r-r9mq-g9jv

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.