ID |
CVE-2017-1000092
|
Sažetak |
Git Plugin connects to a user-specified Git repository as part of form validation. An attacker with no direct access to Jenkins but able to guess at a username/password credentials ID could trick a developer with job configuration permissions into following a link with a maliciously crafted Jenkins URL which would result in the Jenkins Git client sending the username and password to an attacker-controlled server. |
Reference |
|
CVSS |
Base: | 2.6 |
Impact: | 2.9 |
Exploitability: | 4.9 |
|
Pristup |
Vektor | Složenost | Autentikacija |
NETWORK |
HIGH |
NONE |
|
Impact |
Povjerljivost | Cjelovitost | Dostupnost |
PARTIAL |
NONE |
NONE |
|
CVSS vektor |
AV:N/AC:H/Au:N/C:P/I:N/A:N |
Zadnje važnije ažuriranje |
17-10-2017 - 17:02 |
Objavljeno |
05-10-2017 - 01:29 |