First published: Mon Jul 23 2018(Updated: )
A exposure of sensitive information vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in Plugin.java that allows attackers to determine the date and time when a plugin HPI/JPI file was last extracted, which typically is the date of the most recent installation/upgrade.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.main:jenkins-core | >=2.122<2.132 | 2.132 |
maven/org.jenkins-ci.main:jenkins-core | <2.121.2 | 2.121.2 |
Jenkins | <=2.121.1 | |
Jenkins | <=2.132 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1999006 is classified as a moderate severity vulnerability due to the potential exposure of sensitive information.
To remediate CVE-2018-1999006, upgrade Jenkins to version 2.133 or later.
Jenkins versions 2.132 and earlier, as well as 2.121.1 and earlier, are affected by CVE-2018-1999006.
CVE-2018-1999006 allows attackers to determine the date and time of the last extraction of a plugin HPI/JPI file.
CVE-2018-1999006 does not require remote access to be exploited, but it does expose sensitive information that could aid attackers.