CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:S/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
EPSS
Percentile
28.4%
A exposure of sensitive information vulnerability exists in Jenkins Configuration as Code Plugin 0.7-alpha and earlier in ConfigurationAsCode.java that allows attackers with Overall/Read access to obtain the YAML export of the Jenkins configuration.
Vendor | Product | Version | CPE |
---|---|---|---|
jenkins | configuration_as_code | 0.1 | cpe:2.3:a:jenkins:configuration_as_code:0.1:alpha:*:*:*:jenkins:*:* |
jenkins | configuration_as_code | 0.2 | cpe:2.3:a:jenkins:configuration_as_code:0.2:alpha:*:*:*:jenkins:*:* |
jenkins | configuration_as_code | 0.3 | cpe:2.3:a:jenkins:configuration_as_code:0.3:alpha:*:*:*:jenkins:*:* |
jenkins | configuration_as_code | 0.4 | cpe:2.3:a:jenkins:configuration_as_code:0.4:alpha:*:*:*:jenkins:*:* |
jenkins | configuration_as_code | 0.5 | cpe:2.3:a:jenkins:configuration_as_code:0.5:alpha:*:*:*:jenkins:*:* |
jenkins | configuration_as_code | 0.6 | cpe:2.3:a:jenkins:configuration_as_code:0.6:alpha:*:*:*:jenkins:*:* |
jenkins | configuration_as_code | 0.7 | cpe:2.3:a:jenkins:configuration_as_code:0.7:alpha:*:*:*:jenkins:*:* |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:S/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
EPSS
Percentile
28.4%