Vulnerability CVE-2017-1000092


Published: 2017-10-04   Modified: 2017-10-05

Description:
Git Plugin connects to a user-specified Git repository as part of form validation. An attacker with no direct access to Jenkins but able to guess at a username/password credentials ID could trick a developer with job configuration permissions into following a link with a maliciously crafted Jenkins URL which would result in the Jenkins Git client sending the username and password to an attacker-controlled server.

CVSS2 => (AV:N/AC:H/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
2.6/10
2.9/10
4.9/10
Exploit range
Attack complexity
Authentication
Remote
High
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Jenkins -> GIT 

 References:
http://www.securityfocus.com/bid/100435
https://jenkins.io/security/advisory/2017-07-10/

Copyright 2024, cxsecurity.com

 

Back to Top