First published: Wed Jan 09 2019(Updated: )
An insufficiently protected credentials vulnerability exists in Jenkins Crowd 2 Integration Plugin 2.0.0 and earlier in CrowdSecurityRealm.java, CrowdConfigurationService.java that allows attackers with local file system access to obtain the credentials used to connect to Crowd 2.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Crowd | <=2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000423 is rated as a medium severity vulnerability due to its ability to expose credentials.
To fix CVE-2018-1000423, upgrade to a version of the Jenkins Crowd 2 Integration Plugin later than 2.0.0.
CVE-2018-1000423 affects Jenkins Crowd 2 Integration Plugin version 2.0.0 and earlier.
The implications of CVE-2018-1000423 include potential unauthorized access to credentials used for connecting to Crowd 2.
Organizations using the vulnerable versions of Jenkins Crowd 2 Integration Plugin are at risk due to CVE-2018-1000423.