Lucene search

K
cve[email protected]CVE-2017-1000401
HistoryJan 26, 2018 - 2:29 a.m.

CVE-2017-1000401

2018-01-2602:29:01
CWE-20
web.nvd.nist.gov
63
cve-2017-1000401
jenkins
form control
passwords
secrets
form validation
ajax
http access log
nvd

CVSS2

1.2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:H/Au:N/C:P/I:N/A:N

CVSS3

2.2

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N

AI Score

4

Confidence

High

EPSS

0

Percentile

12.6%

The Jenkins 2.73.1 and earlier, 2.83 and earlier default form control for passwords and other secrets, <f:password/>, supports form validation (e.g. for API keys). The form validation AJAX requests were sent via GET, which could result in secrets being logged to a HTTP access log in non-default configurations of Jenkins, and made available to users with access to these log files. Form validation for <f:password/> is now always sent via POST, which is typically not logged.

Affected configurations

NVD
Node
jenkinsjenkinsRange2.73.1lts
OR
jenkinsjenkinsRange2.83-
VendorProductVersionCPE
jenkinsjenkinscpe:/a:jenkins:jenkins:::lts:
jenkinsjenkinscpe:/a:jenkins:jenkins:::-:

CVSS2

1.2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:H/Au:N/C:P/I:N/A:N

CVSS3

2.2

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N

AI Score

4

Confidence

High

EPSS

0

Percentile

12.6%