Lucene search

K
ubuntucveUbuntu.comUB:CVE-2017-1000401
HistoryJan 26, 2018 - 12:00 a.m.

CVE-2017-1000401

2018-01-2600:00:00
ubuntu.com
ubuntu.com
11

CVSS2

1.2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:H/Au:N/C:P/I:N/A:N

CVSS3

2.2

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N

EPSS

0

Percentile

12.6%

The Jenkins 2.73.1 and earlier, 2.83 and earlier default form control for
passwords and other secrets, <f:password/>, supports form validation (e.g.
for API keys). The form validation AJAX requests were sent via GET, which
could result in secrets being logged to a HTTP access log in non-default
configurations of Jenkins, and made available to users with access to these
log files. Form validation for <f:password/> is now always sent via POST,
which is typically not logged.

CVSS2

1.2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:H/Au:N/C:P/I:N/A:N

CVSS3

2.2

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N

EPSS

0

Percentile

12.6%