vulnerability

Jenkins Advisory 2017-10-11: CVE-2017-1000401: Form validation for password fields was sent via GET

Severity
1
CVSS
(AV:L/AC:H/Au:N/C:P/I:N/A:N)
Published
2017-11-20
Added
2017-11-20
Modified
2019-01-21

Description

The Jenkins 2.73.1 and earlier, 2.83 and earlier default form control for passwords and other secrets, , supports form validation (e.g. for API keys). The form validation AJAX requests were sent via GET, which could result in secrets being logged to a HTTP access log in non-default configurations of Jenkins, and made available to users with access to these log files. Form validation for is now always sent via POST, which is typically not logged.

Solution(s)

jenkins-lts-upgrade-2_73_2jenkins-upgrade-2_84
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.