CVE-2019-1003021
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An exposure of sensitive information vulnerability exists in Jenkins OpenId Connect Authentication Plugin 1.4 and earlier in OicSecurityRealm/config.jelly that allows attackers able to view a Jenkins administrator's web browser output, or control the browser (e.g. malicious extension) to retrieve the configured client secret.
Existe una vulnerabilidad de exposición de información sensible en Jenkins OpenId Connect Authentication Plugin, en versiones 1.4 y anteriores, en OicSecurityRealm/config.jelly, que permite que los atacantes que puedan ver la salida del navegador web de un administrador de Jenkins o controlar el navegador (por ejemplo, mediante una extensión maliciosa) para recuperar el secreto del cliente configurado.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-02-06 CVE Reserved
- 2019-02-06 CVE Published
- 2024-09-17 CVE Updated
- 2024-09-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://jenkins.io/security/advisory/2019-01-28/#SECURITY-886 | 2023-10-25 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Jenkins Search vendor "Jenkins" | Openid Connect Authentication Search vendor "Jenkins" for product "Openid Connect Authentication" | <= 1.4 Search vendor "Jenkins" for product "Openid Connect Authentication" and version " <= 1.4" | jenkins |
Affected
|