First published: Tue Jun 05 2018(Updated: )
A exposure of sensitive information vulnerability exists in Jenkins GitHub Plugin 1.29.0 and older in GitHubServerConfig.java that allows attackers with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Github | <=1.29.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this exposure of sensitive information vulnerability is CVE-2018-1000183.
The affected software for this vulnerability is Jenkins GitHub Plugin version 1.29.0 and older.
The severity rating of CVE-2018-1000183 is medium with a score of 6.5.
An attacker with Overall/Read access can connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing sensitive information.
Yes, you can find more information about this vulnerability at [this link](https://jenkins.io/security/advisory/2018-06-04/#SECURITY-804).