Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hr74-2j5v-ghfv

Опубликовано: 14 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 4

Описание

Jenkins GitHub Pull Request Builder Plugin allows attacker with local file system access to obtain GitHub credentials

An exposure of sensitive information vulnerability exists in Jenkins GitHub Pull Request Builder Plugin version 1.39.0 and older in GhprbCause.java that allows an attacker with local file system access to obtain GitHub credentials. Since 1.40.0, the plugin no longer stores serialized objects containing the credential on disk. Builds started before the plugin was updated to 1.40.0 will retain the encoded credentials on disk. We strongly recommend revoking old GitHub credentials used in Jenkins. We’re providing a script for use in the Script Console that will attempt to remove old stored credentials from build.xml files.

Пакеты

Наименование

org.jenkins-ci.plugins:ghprb

maven
Затронутые версииВерсия исправления

<= 1.39.0

1.40.0

EPSS

Процентиль: 4%
0.00019
Низкий

4 Medium

CVSS3

Дефекты

CWE-200

Связанные уязвимости

CVSS3: 7.8
nvd
почти 8 лет назад

An exposure of sensitive information vulnerability exists in Jenkins GitHub Pull Request Builder Plugin version 1.39.0 and older in GhprbCause.java that allows an attacker with local file system access to obtain GitHub credentials.

EPSS

Процентиль: 4%
0.00019
Низкий

4 Medium

CVSS3

Дефекты

CWE-200