Lucene search

K
cve[email protected]CVE-2023-39152
HistoryJul 26, 2023 - 2:15 p.m.

CVE-2023-39152

2023-07-2614:15:10
CWE-670
web.nvd.nist.gov
198
cve
jenkins
gradle plugin
control flow
security vulnerability
nvd

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

21.0%

Always-incorrect control flow implementation in Jenkins Gradle Plugin 2.8 may result in credentials not being masked (i.e., replaced with asterisks) in the build log in some circumstances.

Affected configurations

NVD
Node
jenkinsgradleMatch2.8jenkins
CPENameOperatorVersion
jenkins:gradlejenkins gradleeq2.8

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Jenkins Gradle Plugin",
    "vendor": "Jenkins Project",
    "versions": [
      {
        "status": "affected",
        "version": "2.8"
      }
    ]
  }
]

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

21.0%

Related for CVE-2023-39152