First published: Tue Jun 26 2018(Updated: )
A exposure of sensitive information vulnerability exists in Jenkins GitHub Plugin 1.29.1 and earlier in GitHubTokenCredentialsCreator.java that allows attackers to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Github | <=1.29.1 | |
maven/com.coravy.hudson.plugins.github:github | <=1.29.1 | 1.29.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-1000600 and the title is 'A exposure of sensitive information vulnerability exists in Jenkins GitHub Plugin 1.29.1 and earlier.'
The severity of CVE-2018-1000600 is high with a CVSS score of 8.8.
Jenkins GitHub Plugin versions up to and including 1.29.1 are affected by CVE-2018-1000600.
An attacker can exploit CVE-2018-1000600 by using an attacker-specified URL and credentials IDs obtained through another method to capture credentials stored in Jenkins.
Yes, a fix for CVE-2018-1000600 is available. It is recommended to update Jenkins GitHub Plugin to a version later than 1.29.1 to mitigate the vulnerability.