CVE-2018-1000610
moderate-risk
Published 2018-06-26
A exposure of sensitive information vulnerability exists in Jenkins Configuration as Code Plugin 0.7-alpha and earlier in DataBoundConfigurator.java, Attribute.java, BaseConfigurator.java, ExtensionConfigurator.java that allows attackers with access to Jenkins log files to obtain the passwords configured using Configuration as Code Plugin.
Do I need to act?
-
0.05% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (7)
Configuration As Code
Configuration As Code
Configuration As Code
Configuration As Code
Configuration As Code
Configuration As Code
Configuration As Code
Affected Vendors
References (2)
Vendor Advisory
https://jenkins.io/security/advisory/2018-06-25/#SECURITY-929
Vendor Advisory
https://jenkins.io/security/advisory/2018-06-25/#SECURITY-929
44
/ 100
moderate-risk
Severity
30/34 · Critical
Exploitability
0/34 · Minimal
Exposure
14/34 · Moderate