ghsa-6h72-m3xw-fp3c
Vulnerability from github
Published
2022-05-13 01:40
Modified
2024-01-30 22:44
Severity ?
Summary
Improper Privilege Management in Jenkins Config File Provider Plugin
Details
The Config File Provider Plugin is used to centrally manage configuration files that often include secrets, such as passwords. Users with only Overall/Read access to Jenkins were able to access URLs directly that allowed viewing these files. Access to view these files now requires sufficient permissions to configure the provided files, view the configuration of the folder in which the configuration files are defined, or have Job/Configure permissions to a job able to use these files.
{ "affected": [ { "database_specific": { "last_known_affected_version_range": "\u003c= 2.16.1" }, "package": { "ecosystem": "Maven", "name": "org.jenkins-ci.plugins:config-file-provider" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "2.16.2" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2017-1000104" ], "database_specific": { "cwe_ids": [ "CWE-269" ], "github_reviewed": true, "github_reviewed_at": "2024-01-30T22:44:21Z", "nvd_published_at": "2017-10-05T01:29:00Z", "severity": "MODERATE" }, "details": "The Config File Provider Plugin is used to centrally manage configuration files that often include secrets, such as passwords. Users with only Overall/Read access to Jenkins were able to access URLs directly that allowed viewing these files. Access to view these files now requires sufficient permissions to configure the provided files, view the configuration of the folder in which the configuration files are defined, or have Job/Configure permissions to a job able to use these files.", "id": "GHSA-6h72-m3xw-fp3c", "modified": "2024-01-30T22:44:21Z", "published": "2022-05-13T01:40:56Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000104" }, { "type": "WEB", "url": "https://jenkins.io/security/advisory/2017-08-07" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ], "summary": "Improper Privilege Management in Jenkins Config File Provider Plugin" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.