Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1jd2NmLTVtNXctbXEyd84AAWew
Exposure of Sensitive Information to an Unauthorized Actor in Jenkins SSH Credentials Plugin
A arbitrary file read vulnerability exists in Jenkins SSH Credentials Plugin 1.13 and earlier in BasicSSHUserPrivateKey.java that allows attackers with a Jenkins account and the permission to configure credential bindings to read arbitrary files from the Jenkins master file system.
Permalink: https://github.com/advisories/GHSA-cwcf-5m5w-mq2wJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1jd2NmLTVtNXctbXEyd84AAWew
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: 5 months ago
CVSS Score: 6.5
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Identifiers: GHSA-cwcf-5m5w-mq2w, CVE-2018-1000601
References:
- https://nvd.nist.gov/vuln/detail/CVE-2018-1000601
- https://jenkins.io/security/advisory/2018-06-25/#SECURITY-440
- https://github.com/jenkinsci/ssh-credentials-plugin/commit/18b3121fa94a174064447d637dc11539e33b3a76
- https://github.com/jenkinsci/ssh-credentials-plugin/commits/ssh-credentials-1.14
- https://github.com/jenkinsci/credentials-plugin/commit/23fbd6de33cc3cb74eafd44e7b27dd87b52c8904
- https://github.com/advisories/GHSA-cwcf-5m5w-mq2w
Blast Radius: 1.0
Affected Packages
maven:org.jenkins-ci.plugins:credentials
Affected Version Ranges: < 2.1.17Fixed in: 2.1.17
maven:org.jenkins-ci.plugins:ssh-credentials
Affected Version Ranges: <= 1.13Fixed in: 1.14