First published: Wed Jul 31 2019(Updated: )
Jenkins Configuration as Code Plugin 1.24 and earlier did not escape values resulting in variable interpolation during configuration import when exporting, allowing attackers with permission to change Jenkins system configuration to obtain the values of environment variables.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/io.jenkins:configuration-as-code | <=1.24 | 1.25 |
Jenkins Configuration as Code | <=1.24 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10362 has a high severity rating due to potential exposure of sensitive configuration values.
To fix CVE-2019-10362, upgrade the Jenkins Configuration as Code Plugin to version 1.25 or later.
The impact of CVE-2019-10362 allows attackers with permission to modify Jenkins configurations to leak the values of environment variables.
CVE-2019-10362 affects Jenkins Configuration as Code Plugin versions 1.24 and earlier.
CVE-2019-10362 is a local vulnerability, requiring user permissions to exploit the configuration changes.