Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1oOGM1LWM5MmctanE2eM4AATfr
Improper Input Validation in Jenkins
The Jenkins 2.73.1 and earlier, 2.83 and earlier default form control for passwords and other secrets, <f:password/>, supports form validation (e.g. for API keys). The form validation AJAX requests were sent via GET, which could result in secrets being logged to a HTTP access log in non-default configurations of Jenkins, and made available to users with access to these log files. Form validation for <f:password/> is now always sent via POST, which is typically not logged.
Permalink: https://github.com/advisories/GHSA-h8c5-c92g-jq6xJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1oOGM1LWM5MmctanE2eM4AATfr
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: almost 2 years ago
Updated: about 1 year ago
CVSS Score: 2.2
CVSS vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N
Identifiers: GHSA-h8c5-c92g-jq6x, CVE-2017-1000401
References:
- https://nvd.nist.gov/vuln/detail/CVE-2017-1000401
- https://jenkins.io/security/advisory/2017-10-11/
- https://github.com/jenkinsci/jenkins/commit/09d60462b9edf775f08568601bb3e2cfd8075368
- https://github.com/jenkinsci/jenkins/blob/6d179998e18adfbaa4e443c7e837135bf36c53d7/test/src/test/java/lib/form/PasswordTest.java
- https://github.com/advisories/GHSA-h8c5-c92g-jq6x
Blast Radius: 1.0
Affected Packages
maven:org.jenkins-ci.main:jenkins-core
Affected Version Ranges: >= 2.74, <= 2.83, <= 2.73.1Fixed in: 2.84, 2.73.2