First published: Tue Jun 26 2018(Updated: )
A exposure of sensitive information vulnerability exists in Jenkins Configuration as Code Plugin 0.7-alpha and earlier in ConfigurationAsCode.java that allows attackers with Overall/Read access to obtain the YAML export of the Jenkins configuration.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Configuration As Code | =0.1-alpha | |
Jenkins Configuration As Code | =0.2-alpha | |
Jenkins Configuration As Code | =0.3-alpha | |
Jenkins Configuration As Code | =0.4-alpha | |
Jenkins Configuration As Code | =0.5-alpha | |
Jenkins Configuration As Code | =0.6-alpha | |
Jenkins Configuration As Code | =0.7-alpha |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000609 is classified as a medium severity vulnerability.
To fix CVE-2018-1000609, update the Jenkins Configuration as Code Plugin to version 0.7 or later.
CVE-2018-1000609 affects Jenkins Configuration as Code Plugin versions 0.7-alpha and earlier.
CVE-2018-1000609 exposes the YAML export of the Jenkins configuration.
Attackers with Overall/Read access can exploit CVE-2018-1000609.