Vulnerability Description
An insufficiently protected credentials vulnerability exists in Jenkins SonarQube Scanner Plugin 2.8 and earlier in SonarInstallation.java that allows attackers with local file system access to obtain the credentials used to connect to SonarQube.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sonarsource | Sonarqube Scanner | <= 2.8 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/106532Third Party AdvisoryVDB Entry
- https://jenkins.io/security/advisory/2018-09-25/#SECURITY-1163Third Party Advisory
- http://www.securityfocus.com/bid/106532Third Party AdvisoryVDB Entry
- https://jenkins.io/security/advisory/2018-09-25/#SECURITY-1163Third Party Advisory
FAQ
What is CVE-2018-1000425?
CVE-2018-1000425 is a vulnerability with a CVSS score of 7.8 (HIGH). An insufficiently protected credentials vulnerability exists in Jenkins SonarQube Scanner Plugin 2.8 and earlier in SonarInstallation.java that allows attackers with local file system access to obtain...
How severe is CVE-2018-1000425?
CVE-2018-1000425 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-1000425?
Check the references section above for vendor advisories and patch information. Affected products include: Sonarsource Sonarqube Scanner.