| ID |
CVE-2017-1000092
|
| Sažetak |
Git Plugin connects to a user-specified Git repository as part of form validation. An attacker with no direct access to Jenkins but able to guess at a username/password credentials ID could trick a developer with job configuration permissions into following a link with a maliciously crafted Jenkins URL which would result in the Jenkins Git client sending the username and password to an attacker-controlled server. |
| Reference |
|
| CVSS |
| Base: | 2.6 |
| Impact: | 2.9 |
| Exploitability: | 4.9 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| NETWORK |
HIGH |
NONE |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| PARTIAL |
NONE |
NONE |
|
| CVSS vektor |
AV:N/AC:H/Au:N/C:P/I:N/A:N |
| Zadnje važnije ažuriranje |
17-10-2017 - 17:02 |
| Objavljeno |
05-10-2017 - 01:29 |