Docker Commons Plugin provides a list of applicable credential IDs to allow users configuring a job to select the one they'd like to use to authenticate with a Docker Registry. This functionality did not check permissions, allowing any user with Overall/Read permission to get a list of valid credentials IDs. Those could be used as part of an attack to capture the credentials using another vulnerability.
References
Link | Resource |
---|---|
https://jenkins.io/security/advisory/2017-07-10/ | Vendor Advisory |
https://jenkins.io/security/advisory/2017-07-10/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 03:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://jenkins.io/security/advisory/2017-07-10/ - Vendor Advisory |
Information
Published : 2017-10-05 01:29
Updated : 2024-11-21 03:04
NVD link : CVE-2017-1000094
Mitre link : CVE-2017-1000094
CVE.ORG link : CVE-2017-1000094
JSON object : View
Products Affected
jenkins
- docker_commons
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor