Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS01cjZwLXA5cjYtcjMyNs4AAhfs

Improper Encoding or Escaping of Output in Jenkins Configuration as Code Plugin

Jenkins Configuration as Code Plugin 1.24 and earlier did not escape values resulting in variable interpolation during configuration import when exporting, allowing attackers with permission to change Jenkins system configuration to obtain the values of environment variables.

Permalink: https://github.com/advisories/GHSA-5r6p-p9r6-r326
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS01cjZwLXA5cjYtcjMyNs4AAhfs
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: 4 months ago


CVSS Score: 5.4
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Identifiers: GHSA-5r6p-p9r6-r326, CVE-2019-10362
References: Repository: https://github.com/jenkinsci/configuration-as-code-plugin
Blast Radius: 1.0

Affected Packages

maven:io.jenkins:configuration-as-code
Affected Version Ranges: <= 1.24
Fixed in: 1.25