Логотип exploitDog
bind:CVE-2017-1000401
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-1000401

Количество 5

Количество 5

ubuntu логотип

CVE-2017-1000401

около 8 лет назад

The Jenkins 2.73.1 and earlier, 2.83 and earlier default form control for passwords and other secrets, <f:password/>, supports form validation (e.g. for API keys). The form validation AJAX requests were sent via GET, which could result in secrets being logged to a HTTP access log in non-default configurations of Jenkins, and made available to users with access to these log files. Form validation for <f:password/> is now always sent via POST, which is typically not logged.

CVSS3: 2.2
EPSS: Низкий
redhat логотип

CVE-2017-1000401

больше 8 лет назад

The Jenkins 2.73.1 and earlier, 2.83 and earlier default form control for passwords and other secrets, <f:password/>, supports form validation (e.g. for API keys). The form validation AJAX requests were sent via GET, which could result in secrets being logged to a HTTP access log in non-default configurations of Jenkins, and made available to users with access to these log files. Form validation for <f:password/> is now always sent via POST, which is typically not logged.

CVSS3: 2.2
EPSS: Низкий
nvd логотип

CVE-2017-1000401

около 8 лет назад

The Jenkins 2.73.1 and earlier, 2.83 and earlier default form control for passwords and other secrets, <f:password/>, supports form validation (e.g. for API keys). The form validation AJAX requests were sent via GET, which could result in secrets being logged to a HTTP access log in non-default configurations of Jenkins, and made available to users with access to these log files. Form validation for <f:password/> is now always sent via POST, which is typically not logged.

CVSS3: 2.2
EPSS: Низкий
debian логотип

CVE-2017-1000401

около 8 лет назад

The Jenkins 2.73.1 and earlier, 2.83 and earlier default form control ...

CVSS3: 2.2
EPSS: Низкий
github логотип

GHSA-h8c5-c92g-jq6x

больше 3 лет назад

Improper Input Validation in Jenkins

CVSS3: 2.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2017-1000401

The Jenkins 2.73.1 and earlier, 2.83 and earlier default form control for passwords and other secrets, <f:password/>, supports form validation (e.g. for API keys). The form validation AJAX requests were sent via GET, which could result in secrets being logged to a HTTP access log in non-default configurations of Jenkins, and made available to users with access to these log files. Form validation for <f:password/> is now always sent via POST, which is typically not logged.

CVSS3: 2.2
0%
Низкий
около 8 лет назад
redhat логотип
CVE-2017-1000401

The Jenkins 2.73.1 and earlier, 2.83 and earlier default form control for passwords and other secrets, <f:password/>, supports form validation (e.g. for API keys). The form validation AJAX requests were sent via GET, which could result in secrets being logged to a HTTP access log in non-default configurations of Jenkins, and made available to users with access to these log files. Form validation for <f:password/> is now always sent via POST, which is typically not logged.

CVSS3: 2.2
0%
Низкий
больше 8 лет назад
nvd логотип
CVE-2017-1000401

The Jenkins 2.73.1 and earlier, 2.83 and earlier default form control for passwords and other secrets, <f:password/>, supports form validation (e.g. for API keys). The form validation AJAX requests were sent via GET, which could result in secrets being logged to a HTTP access log in non-default configurations of Jenkins, and made available to users with access to these log files. Form validation for <f:password/> is now always sent via POST, which is typically not logged.

CVSS3: 2.2
0%
Низкий
около 8 лет назад
debian логотип
CVE-2017-1000401

The Jenkins 2.73.1 and earlier, 2.83 and earlier default form control ...

CVSS3: 2.2
0%
Низкий
около 8 лет назад
github логотип
GHSA-h8c5-c92g-jq6x

Improper Input Validation in Jenkins

CVSS3: 2.2
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу