CVE-2018-1000186
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A exposure of sensitive information vulnerability exists in Jenkins GitHub Pull Request Builder Plugin 1.41.0 and older in GhprbGitHubAuth.java that allows attackers with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Existe una vulnerabilidad de exposición de información sensible en el plugin GitHub Pull Request Builder 1.41.0 y anteriores de Jenkins en GhprbGitHubAuth.java que permite que los atacantes con acceso Overall/Read se conecten a un URL especificado por el atacante, usando ID de credenciales especificadas por el atacante obtenidos a través de otro método, capturando las credenciales almacenadas en Jenkins.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-06-05 CVE Reserved
- 2018-06-05 CVE Published
- 2024-04-25 EPSS Updated
- 2024-09-16 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://jenkins.io/security/advisory/2018-06-04/#SECURITY-805 | 2018-07-18 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Jenkins Search vendor "Jenkins" | Github Pull Request Builder Search vendor "Jenkins" for product "Github Pull Request Builder" | <= 1.41.0 Search vendor "Jenkins" for product "Github Pull Request Builder" and version " <= 1.41.0" | jenkins |
Affected
|