Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS0zODU4LTU4dzktd3BjZ84AAQ7F
Jenkins OpenId Connect Authentication Plugin showed plain text client secret in configuration form
An exposure of sensitive information vulnerability exists in Jenkins OpenId Connect Authentication Plugin 1.4 and earlier in OicSecurityRealm/config.jelly that allows attackers able to view a Jenkins administrator's web browser output, or control the browser (e.g. malicious extension) to retrieve the configured client secret.
Permalink: https://github.com/advisories/GHSA-3858-58w9-wpcgJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0zODU4LTU4dzktd3BjZ84AAQ7F
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 2 years ago
Updated: 4 months ago
CVSS Score: 4.3
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
Identifiers: GHSA-3858-58w9-wpcg, CVE-2019-1003021
References:
- https://nvd.nist.gov/vuln/detail/CVE-2019-1003021
- https://jenkins.io/security/advisory/2019-01-28/#SECURITY-886
- https://github.com/advisories/GHSA-3858-58w9-wpcg
Affected Packages
maven:org.jenkins-ci.plugins:oic-auth
Affected Version Ranges: <= 1.4Fixed in: 1.5