Description
An exposure of sensitive information vulnerability exists in Jenkins GitHub Authentication Plugin 0.29 and earlier in GithubSecurityRealm/config.jelly that allows attackers able to view a Jenkins administrator's web browser output, or control the browser (e.g. malicious extension) to retrieve the configured client secret.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-3138 | An exposure of sensitive information vulnerability exists in Jenkins GitHub Authentication Plugin 0.29 and earlier in GithubSecurityRealm/config.jelly that allows attackers able to view a Jenkins administrator's web browser output, or control the browser (e.g. malicious extension) to retrieve the configured client secret. |
Github GHSA |
GHSA-87pj-9q82-m9qh | GitHub Authentication Plugin showed plain text client secret in configuration form |
References
History
No history.
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-09-16T20:43:31.251Z
Reserved: 2019-02-06T00:00:00.000Z
Link: CVE-2019-1003018
No data.
Status : Modified
Published: 2019-02-06T16:29:00.890
Modified: 2024-11-21T04:17:44.970
Link: CVE-2019-1003018
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA