The Config File Provider Plugin is used to centrally manage configuration files that often include secrets, such as passwords. Users with only Overall/Read access to Jenkins were able to access URLs directly that allowed viewing these files. Access to view these files now requires sufficient permissions to configure the provided files, view the configuration of the folder in which the configuration files are defined, or have Job/Configure permissions to a job able to use these files.
References
Link | Resource |
---|---|
https://jenkins.io/security/advisory/2017-08-07/ | Vendor Advisory |
https://jenkins.io/security/advisory/2017-08-07/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 03:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://jenkins.io/security/advisory/2017-08-07/ - Vendor Advisory |
Information
Published : 2017-10-05 01:29
Updated : 2024-11-21 03:04
NVD link : CVE-2017-1000104
Mitre link : CVE-2017-1000104
CVE.ORG link : CVE-2017-1000104
JSON object : View
Products Affected
jenkins
- config_file_provider
CWE
CWE-269
Improper Privilege Management