Executive Summary

Informations
NameCVE-2018-1000169First vendor Publication2018-04-16
VendorCveLast vendor Modification2018-05-23

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N)
Cvss Base Score5Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

An exposure of sensitive information vulnerability exists in Jenkins 2.115 and older, LTS 2.107.1 and older, in CLICommand.java and ViewOptionHandler.java that allows unauthorized attackers to confirm the existence of agents or views with an attacker-specified name by sending a CLI command to Jenkins.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000169

CWE : Common Weakness Enumeration

%idName
100 %CWE-200Information Exposure

CPE : Common Platform Enumeration

TypeDescriptionCount
Application864

Nessus® Vulnerability Scanner

DateDescription
2018-05-03Name : A job scheduling and management system hosted on the remote web server is aff...
File : jenkins_2_116.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

SourceUrl
CONFIRM https://jenkins.io/security/advisory/2018-04-11/#SECURITY-754

Alert History

If you want to see full details history, please login or register.
0
1
DateInformations
2018-05-23 21:19:33
  • Multiple Updates
2018-04-16 13:20:36
  • First insertion