First published: Wed Aug 01 2018(Updated: )
An exposure of sensitive information vulnerability exists in Jenkins SaltStack Plugin 3.1.6 and earlier in SaltAPIBuilder.java, SaltAPIStep.java that allows attackers to capture credentials with a known credentials ID stored in Jenkins.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Saltstack | <=3.1.6 | |
maven/org.jenkins-ci.plugins:saltstack | <=3.1.6 | 3.1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1999027 has been assigned a medium severity rating due to the potential exposure of sensitive information.
To fix CVE-2018-1999027, upgrade the Jenkins SaltStack Plugin to version 3.1.7 or later.
CVE-2018-1999027 affects Jenkins SaltStack Plugin versions 3.1.6 and earlier.
CVE-2018-1999027 could expose credentials associated with known credentials IDs stored in Jenkins.
There is no documented workaround for CVE-2018-1999027, so it is recommended to upgrade to the fixed version.