CVE-2017-1000401

The Jenkins 2.73.1 and earlier, 2.83 and earlier default form control for passwords and other secrets, <f:password/>, supports form validation (e.g. for API keys). The form validation AJAX requests were sent via GET, which could result in secrets being logged to a HTTP access log in non-default configurations of Jenkins, and made available to users with access to these log files. Form validation for <f:password/> is now always sent via POST, which is typically not logged.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*

History

21 Nov 2024, 03:04

Type Values Removed Values Added
References () https://jenkins.io/security/advisory/2017-10-11/ - Vendor Advisory () https://jenkins.io/security/advisory/2017-10-11/ - Vendor Advisory

Information

Published : 2018-01-26 02:29

Updated : 2024-11-21 03:04


NVD link : CVE-2017-1000401

Mitre link : CVE-2017-1000401

CVE.ORG link : CVE-2017-1000401


JSON object : View

Products Affected

jenkins

  • jenkins
CWE
CWE-20

Improper Input Validation