Логотип exploitDog
bind:CVE-2023-43494
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-43494

Количество 4

Количество 4

redhat логотип

CVE-2023-43494

больше 2 лет назад

Jenkins 2.50 through 2.423 (both inclusive), LTS 2.60.1 through 2.414.1 (both inclusive) does not exclude sensitive build variables (e.g., password parameter values) from the search in the build history widget, allowing attackers with Item/Read permission to obtain values of sensitive variables used in builds by iteratively testing different characters until the correct sequence is discovered.

CVSS3: 4.3
EPSS: Средний
nvd логотип

CVE-2023-43494

больше 2 лет назад

Jenkins 2.50 through 2.423 (both inclusive), LTS 2.60.1 through 2.414.1 (both inclusive) does not exclude sensitive build variables (e.g., password parameter values) from the search in the build history widget, allowing attackers with Item/Read permission to obtain values of sensitive variables used in builds by iteratively testing different characters until the correct sequence is discovered.

CVSS3: 4.3
EPSS: Средний
debian логотип

CVE-2023-43494

больше 2 лет назад

Jenkins 2.50 through 2.423 (both inclusive), LTS 2.60.1 through 2.414. ...

CVSS3: 4.3
EPSS: Средний
github логотип

GHSA-279f-qwgh-h5mp

больше 2 лет назад

Jenkins does not exclude sensitive build variables from search

CVSS3: 4.3
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2023-43494

Jenkins 2.50 through 2.423 (both inclusive), LTS 2.60.1 through 2.414.1 (both inclusive) does not exclude sensitive build variables (e.g., password parameter values) from the search in the build history widget, allowing attackers with Item/Read permission to obtain values of sensitive variables used in builds by iteratively testing different characters until the correct sequence is discovered.

CVSS3: 4.3
49%
Средний
больше 2 лет назад
nvd логотип
CVE-2023-43494

Jenkins 2.50 through 2.423 (both inclusive), LTS 2.60.1 through 2.414.1 (both inclusive) does not exclude sensitive build variables (e.g., password parameter values) from the search in the build history widget, allowing attackers with Item/Read permission to obtain values of sensitive variables used in builds by iteratively testing different characters until the correct sequence is discovered.

CVSS3: 4.3
49%
Средний
больше 2 лет назад
debian логотип
CVE-2023-43494

Jenkins 2.50 through 2.423 (both inclusive), LTS 2.60.1 through 2.414. ...

CVSS3: 4.3
49%
Средний
больше 2 лет назад
github логотип
GHSA-279f-qwgh-h5mp

Jenkins does not exclude sensitive build variables from search

CVSS3: 4.3
49%
Средний
больше 2 лет назад

Уязвимостей на страницу