Vulnerability Description
A exposure of sensitive information vulnerability exists in Jenkins Configuration as Code Plugin 0.7-alpha and earlier in ConfigurationAsCode.java that allows attackers with Overall/Read access to obtain the YAML export of the Jenkins configuration.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jenkins | Configuration As Code | 0.1 |
Related Weaknesses (CWE)
References
- https://jenkins.io/security/advisory/2018-06-25/#SECURITY-927Vendor Advisory
- https://jenkins.io/security/advisory/2018-06-25/#SECURITY-927Vendor Advisory
FAQ
What is CVE-2018-1000609?
CVE-2018-1000609 is a vulnerability with a CVSS score of 6.5 (MEDIUM). A exposure of sensitive information vulnerability exists in Jenkins Configuration as Code Plugin 0.7-alpha and earlier in ConfigurationAsCode.java that allows attackers with Overall/Read access to obt...
How severe is CVE-2018-1000609?
CVE-2018-1000609 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-1000609?
Check the references section above for vendor advisories and patch information. Affected products include: Jenkins Configuration As Code.