Vulnerability Details CVE-2018-1000145
An exposure of sensitive information vulnerability exists in Jenkins Perforce Plugin version 1.3.36 and older in PerforcePasswordEncryptor.java that allows attackers with local file system access to obtain encrypted Perforce passwords and decrypt them.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 28.9%
CVSS Severity
CVSS v3 Score 6.5
CVSS v2 Score 5.0
Products affected by CVE-2018-1000145
-
cpe:2.3:a:jenkins:perforce:1.0.13
-
cpe:2.3:a:jenkins:perforce:1.0.14
-
cpe:2.3:a:jenkins:perforce:1.0.15
-
cpe:2.3:a:jenkins:perforce:1.0.16
-
cpe:2.3:a:jenkins:perforce:1.0.17
-
cpe:2.3:a:jenkins:perforce:1.0.18
-
cpe:2.3:a:jenkins:perforce:1.0.19
-
cpe:2.3:a:jenkins:perforce:1.0.20
-
cpe:2.3:a:jenkins:perforce:1.0.21
-
cpe:2.3:a:jenkins:perforce:1.0.22
-
cpe:2.3:a:jenkins:perforce:1.0.23
-
cpe:2.3:a:jenkins:perforce:1.0.24
-
cpe:2.3:a:jenkins:perforce:1.0.25
-
cpe:2.3:a:jenkins:perforce:1.0.26
-
cpe:2.3:a:jenkins:perforce:1.0.27
-
cpe:2.3:a:jenkins:perforce:1.0.28
-
cpe:2.3:a:jenkins:perforce:1.0.29
-
cpe:2.3:a:jenkins:perforce:1.1.0
-
cpe:2.3:a:jenkins:perforce:1.1.1
-
cpe:2.3:a:jenkins:perforce:1.1.10
-
cpe:2.3:a:jenkins:perforce:1.1.11
-
cpe:2.3:a:jenkins:perforce:1.1.12
-
cpe:2.3:a:jenkins:perforce:1.1.13
-
cpe:2.3:a:jenkins:perforce:1.1.14
-
cpe:2.3:a:jenkins:perforce:1.1.2
-
cpe:2.3:a:jenkins:perforce:1.1.3
-
cpe:2.3:a:jenkins:perforce:1.1.4
-
cpe:2.3:a:jenkins:perforce:1.1.5
-
cpe:2.3:a:jenkins:perforce:1.1.6
-
cpe:2.3:a:jenkins:perforce:1.1.7
-
cpe:2.3:a:jenkins:perforce:1.1.8
-
cpe:2.3:a:jenkins:perforce:1.1.9
-
cpe:2.3:a:jenkins:perforce:1.2.0
-
cpe:2.3:a:jenkins:perforce:1.2.1
-
cpe:2.3:a:jenkins:perforce:1.2.2
-
cpe:2.3:a:jenkins:perforce:1.2.3
-
cpe:2.3:a:jenkins:perforce:1.2.4
-
cpe:2.3:a:jenkins:perforce:1.2.5
-
cpe:2.3:a:jenkins:perforce:1.2.6
-
cpe:2.3:a:jenkins:perforce:1.2.7
-
cpe:2.3:a:jenkins:perforce:1.2.8
-
cpe:2.3:a:jenkins:perforce:1.2.9
-
cpe:2.3:a:jenkins:perforce:1.3.0
-
cpe:2.3:a:jenkins:perforce:1.3.1
-
cpe:2.3:a:jenkins:perforce:1.3.10
-
cpe:2.3:a:jenkins:perforce:1.3.11
-
cpe:2.3:a:jenkins:perforce:1.3.12
-
cpe:2.3:a:jenkins:perforce:1.3.13
-
cpe:2.3:a:jenkins:perforce:1.3.14
-
cpe:2.3:a:jenkins:perforce:1.3.15
-
cpe:2.3:a:jenkins:perforce:1.3.16
-
cpe:2.3:a:jenkins:perforce:1.3.17
-
cpe:2.3:a:jenkins:perforce:1.3.18
-
cpe:2.3:a:jenkins:perforce:1.3.19
-
cpe:2.3:a:jenkins:perforce:1.3.2
-
cpe:2.3:a:jenkins:perforce:1.3.20
-
cpe:2.3:a:jenkins:perforce:1.3.21
-
cpe:2.3:a:jenkins:perforce:1.3.22
-
cpe:2.3:a:jenkins:perforce:1.3.23
-
cpe:2.3:a:jenkins:perforce:1.3.24
-
cpe:2.3:a:jenkins:perforce:1.3.25
-
cpe:2.3:a:jenkins:perforce:1.3.26
-
cpe:2.3:a:jenkins:perforce:1.3.27
-
cpe:2.3:a:jenkins:perforce:1.3.28
-
cpe:2.3:a:jenkins:perforce:1.3.29
-
cpe:2.3:a:jenkins:perforce:1.3.3
-
cpe:2.3:a:jenkins:perforce:1.3.30
-
cpe:2.3:a:jenkins:perforce:1.3.31
-
cpe:2.3:a:jenkins:perforce:1.3.32
-
cpe:2.3:a:jenkins:perforce:1.3.33
-
cpe:2.3:a:jenkins:perforce:1.3.34
-
cpe:2.3:a:jenkins:perforce:1.3.35
-
cpe:2.3:a:jenkins:perforce:1.3.36
-
cpe:2.3:a:jenkins:perforce:1.3.4
-
cpe:2.3:a:jenkins:perforce:1.3.5
-
cpe:2.3:a:jenkins:perforce:1.3.6
-
cpe:2.3:a:jenkins:perforce:1.3.7
-
cpe:2.3:a:jenkins:perforce:1.3.8
-
cpe:2.3:a:jenkins:perforce:1.3.9