First published: Tue Jun 26 2018(Updated: )
A exposure of sensitive information vulnerability exists in Jenkins Configuration as Code Plugin 0.7-alpha and earlier in DataBoundConfigurator.java, Attribute.java, BaseConfigurator.java, ExtensionConfigurator.java that allows attackers with access to Jenkins log files to obtain the passwords configured using Configuration as Code Plugin.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Configuration As Code | =0.1-alpha | |
Jenkins Configuration As Code | =0.2-alpha | |
Jenkins Configuration As Code | =0.3-alpha | |
Jenkins Configuration As Code | =0.4-alpha | |
Jenkins Configuration As Code | =0.5-alpha | |
Jenkins Configuration As Code | =0.6-alpha | |
Jenkins Configuration As Code | =0.7-alpha |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.