First published: Fri Feb 09 2018(Updated: )
Jenkins Credentials Binding Plugin 1.14 and earlier masks passwords it provides to build processes in their build logs. Jenkins however transforms provided password values, e.g. replacing environment variable references, which could result in values different from but similar to configured passwords being provided to the build. Those values are not subject to masking, and could allow unauthorized users to recover the original password.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:credentials-binding | <1.15 | 1.15 |
<=1.14 | ||
Jenkins Credentials Binding | <=1.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000057 is classified as a medium severity vulnerability.
To fix CVE-2018-1000057, upgrade the Jenkins Credentials Binding Plugin to version 1.15 or later.
Versions 1.14 and earlier of the Jenkins Credentials Binding Plugin are affected by CVE-2018-1000057.
CVE-2018-1000057 compromises the masking of passwords in build logs, potentially exposing sensitive information.
No, CVE-2018-1000057 does not directly lead to code execution but affects the confidentiality of sensitive information.