CVE-2019-10362

Jenkins Configuration as Code Plugin 1.24 and earlier did not escape values resulting in variable interpolation during configuration import when exporting, allowing attackers with permission to change Jenkins system configuration to obtain the values of environment variables.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jenkins:configuration_as_code:*:*:*:*:*:jenkins:*:*

History

21 Nov 2024, 04:18

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2019/07/31/1 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2019/07/31/1 - Mailing List, Third Party Advisory
References () https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1446 - Vendor Advisory () https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1446 - Vendor Advisory

Information

Published : 2019-07-31 13:15

Updated : 2024-11-21 04:18


NVD link : CVE-2019-10362

Mitre link : CVE-2019-10362

CVE.ORG link : CVE-2019-10362


JSON object : View

Products Affected

jenkins

  • configuration_as_code
CWE
CWE-116

Improper Encoding or Escaping of Output