CVE-2017-1000401

The Jenkins 2.73.1 and earlier, 2.83 and earlier default form control for passwords and other secrets, <f:password/>, supports form validation (e.g. for API keys). The form validation AJAX requests were sent via GET, which could result in secrets being logged to a HTTP access log in non-default configurations of Jenkins, and made available to users with access to these log files. Form validation for <f:password/> is now always sent via POST, which is typically not logged.
References
Link Resource
https://jenkins.io/security/advisory/2017-10-11/ Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*

History

No history.

Information

Published : 2018-01-26 02:29

Updated : 2024-02-28 16:25


NVD link : CVE-2017-1000401

Mitre link : CVE-2017-1000401

CVE.ORG link : CVE-2017-1000401


JSON object : View

Products Affected

jenkins

  • jenkins
CWE
CWE-20

Improper Input Validation