An exposure of sensitive information vulnerability exists in Jenkins SaltStack Plugin 3.1.6 and earlier in SaltAPIBuilder.java, SaltAPIStep.java that allows attackers to capture credentials with a known credentials ID stored in Jenkins.
References
Link | Resource |
---|---|
https://jenkins.io/security/advisory/2018-07-30/#SECURITY-1009 | Vendor Advisory |
https://jenkins.io/security/advisory/2018-07-30/#SECURITY-1009 | Vendor Advisory |
Configurations
History
21 Nov 2024, 03:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://jenkins.io/security/advisory/2018-07-30/#SECURITY-1009 - Vendor Advisory |
Information
Published : 2018-08-01 13:29
Updated : 2024-11-21 03:57
NVD link : CVE-2018-1999027
Mitre link : CVE-2018-1999027
CVE.ORG link : CVE-2018-1999027
JSON object : View
Products Affected
jenkins
- saltstack
CWE
CWE-352
Cross-Site Request Forgery (CSRF)