CVE-2017-1000401

CVSS V2 Low 1.2 CVSS V3 Low 2.2
Description
The Jenkins 2.73.1 and earlier, 2.83 and earlier default form control for passwords and other secrets, <f:password/>, supports form validation (e.g. for API keys). The form validation AJAX requests were sent via GET, which could result in secrets being logged to a HTTP access log in non-default configurations of Jenkins, and made available to users with access to these log files. Form validation for <f:password/> is now always sent via POST, which is typically not logged.
Overview
  • CVE ID
  • CVE-2017-1000401
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2018-01-26T02:29:01
  • Last Modified Date
  • 2019-05-08T22:24:13
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:* 1 OR 2.73.1
cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:* 1 OR 2.83
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:L/AC:H/Au:N/C:P/I:N/A:N
  • Access Vector
  • LOCAL
  • Access Compatibility
  • HIGH
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • NONE
  • Availability Impact
  • NONE
  • Base Score
  • 1.2
  • Severity
  • LOW
  • Exploitability Score
  • 1.9
  • Impact Score
  • 2.9
CVSS Version 3
  • Version
  • 3.0
  • Vector String
  • CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N
  • Attack Vector
  • LOCAL
  • Attack Compatibility
  • HIGH
  • Privileges Required
  • LOW
  • User Interaction
  • REQUIRED
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • LOW
  • Availability Impact
  • NONE
  • Base Score
  • 2.2
  • Base Severity
  • LOW
  • Exploitability Score
  • 0.8
  • Impact Score
  • 1.4
References
Reference URL Reference Tags
https://jenkins.io/security/advisory/2017-10-11/ Vendor Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 07:53:16 Added to TrackCVE
2022-12-03 01:31:36 2018-01-26T02:29Z 2018-01-26T02:29:01 CVE Published Date updated
2022-12-03 01:31:36 2019-05-08T22:24:13 CVE Modified Date updated
2022-12-03 01:31:36 Analyzed Vulnerability Status updated