Jenkins Credentials Binding Plugin 1.14 and earlier masks passwords it provides to build processes in their build logs. Jenkins however transforms provided password values, e.g. replacing environment variable references, which could result in values different from but similar to configured passwords being provided to the build. Those values are not subject to masking, and could allow unauthorized users to recover the original password.
References
Link | Resource |
---|---|
https://jenkins.io/security/advisory/2018-02-05/ | Vendor Advisory |
https://jenkins.io/security/advisory/2018-02-05/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 03:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://jenkins.io/security/advisory/2018-02-05/ - Vendor Advisory |
Information
Published : 2018-02-09 23:29
Updated : 2024-11-21 03:39
NVD link : CVE-2018-1000057
Mitre link : CVE-2018-1000057
CVE.ORG link : CVE-2018-1000057
JSON object : View
Products Affected
jenkins
- credentials_binding
CWE
CWE-522
Insufficiently Protected Credentials