Vulnerability & Exploit Database

Back to search

Jenkins Advisory 2017-10-11: CVE-2017-1000401: Form validation for password fields was sent via GET

Severity CVSS Published Added Modified
4 (AV:L/AC:M/Au:N/C:P/I:P/A:P) November 19, 2017 November 19, 2017 November 19, 2017

Description

The Jenkins default form control for passwords and other secrets, , supports form validation (e.g. for API keys). The form validation AJAX requests were sent via GET, which could result in secrets being logged to a HTTP access log in non-default configurations of Jenkins, and made available to users with access to these log files.Form validation for is now always sent via POST, with the password in the request body, which is typically not logged.

Free Nexpose Download

Discover, prioritize, and remediate security risks today!

 Download now

References

Solution

jenkins-lts-upgrade-2_73_2

Related Vulnerabilities