vulnerability

Jenkins Advisory 2017-10-11: Form validation for password fields was sent via GET

Severity
4
CVSS
(AV:N/AC:L/Au:S/C:P/I:N/A:N)
Published
Nov 13, 2017
Added
Nov 13, 2017
Modified
Feb 19, 2025

Description

The Jenkins default form control for passwords and other secrets, , supports form validation (e.g. for API keys).
The form validation AJAX requests were sent via GET, which could result in secrets being logged to a HTTP access log in non-default configurations of Jenkins, and made available to users with access to these log files.Form validation for is now always sent via POST, with the password in the request body, which is typically not logged.

Solution

jenkins-lts-upgrade-2_73_2
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.