First published: Tue Jun 05 2018(Updated: )
A exposure of sensitive information vulnerability exists in Jenkins Gitlab Hook Plugin 1.4.2 and older in gitlab_notifier.rb, views/gitlab_notifier/global.erb that allows attackers with local Jenkins master file system access or control of a Jenkins administrator's web browser (e.g. malicious extension) to retrieve the configured Gitlab token.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Gitlab Hook | <=1.4.2 | |
maven/org.jenkins-ci.ruby-plugins:gitlab-hook | <=1.4.2 | |
<=1.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000196 has been classified as a moderate severity vulnerability.
To fix CVE-2018-1000196, update the Jenkins Gitlab Hook Plugin to version 1.4.3 or later.
CVE-2018-1000196 affects Jenkins Gitlab Hook Plugin versions 1.4.2 and older.
CVE-2018-1000196 is an exposure of sensitive information vulnerability.
CVE-2018-1000196 can be exploited by attackers with local access to the Jenkins master file system or control over an administrator's web browser.