vulnerability
Jenkins Advisory 2017-10-11: Form validation for password fields was sent via GET
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:L/Au:S/C:P/I:N/A:N) | Nov 13, 2017 | Nov 13, 2017 | Feb 19, 2025 |
Severity
4
CVSS
(AV:N/AC:L/Au:S/C:P/I:N/A:N)
Published
Nov 13, 2017
Added
Nov 13, 2017
Modified
Feb 19, 2025
Description
The Jenkins default form control for passwords and other secrets, , supports form validation (e.g. for API keys).
The form validation AJAX requests were sent via GET, which could result in secrets being logged to a HTTP access log in non-default configurations of Jenkins, and made available to users with access to these log files.Form validation for is now always sent via POST, with the password in the request body, which is typically not logged.
Solution
jenkins-lts-upgrade-2_73_2
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.