Vulnerability Description
The Jenkins 2.73.1 and earlier, 2.83 and earlier default form control for passwords and other secrets, <f:password/>, supports form validation (e.g. for API keys). The form validation AJAX requests were sent via GET, which could result in secrets being logged to a HTTP access log in non-default configurations of Jenkins, and made available to users with access to these log files. Form validation for <f:password/> is now always sent via POST, which is typically not logged.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jenkins | Jenkins | <= 2.73.1 |
Related Weaknesses (CWE)
References
- https://jenkins.io/security/advisory/2017-10-11/Vendor Advisory
- https://jenkins.io/security/advisory/2017-10-11/Vendor Advisory
FAQ
What is CVE-2017-1000401?
CVE-2017-1000401 is a vulnerability with a CVSS score of 2.2 (LOW). The Jenkins 2.73.1 and earlier, 2.83 and earlier default form control for passwords and other secrets, <f:password/>, supports form validation (e.g. for API keys). The form validation AJAX requests we...
How severe is CVE-2017-1000401?
CVE-2017-1000401 has been rated LOW with a CVSS base score of 2.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-1000401?
Check the references section above for vendor advisories and patch information. Affected products include: Jenkins Jenkins.