First published: Tue Jun 05 2018(Updated: )
A exposure of sensitive information vulnerability exists in Jenkins Black Duck Hub Plugin 4.0.0 and older in PostBuildScanDescriptor.java that allows attackers with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Black Duck Hub | <=4.0.0 | |
maven/com.blackducksoftware.integration:blackduck-hub | <=4.0.0 | 4.0.1 |
<=4.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000190 is classified as a vulnerability that exposes sensitive information, potentially allowing unauthorized access.
To fix CVE-2018-1000190, upgrade to Jenkins Black Duck Hub Plugin version 4.0.1 or later.
CVE-2018-1000190 affects users of Jenkins Black Duck Hub Plugin versions 4.0.0 and older.
Exploiting CVE-2018-1000190 requires Overall/Read access to the Jenkins environment.
CVE-2018-1000190 allows attackers to access sensitive information by connecting to a specified URL using attacker-provided credentials.