Vulnerability Details CVE-2019-1003018
An exposure of sensitive information vulnerability exists in Jenkins GitHub Authentication Plugin 0.29 and earlier in GithubSecurityRealm/config.jelly that allows attackers able to view a Jenkins administrator's web browser output, or control the browser (e.g. malicious extension) to retrieve the configured client secret.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 10.6%
CVSS Severity
CVSS v3 Score 4.3
CVSS v2 Score 4.3
Products affected by CVE-2019-1003018
-
cpe:2.3:a:jenkins:github_oauth:0.1
-
cpe:2.3:a:jenkins:github_oauth:0.10
-
cpe:2.3:a:jenkins:github_oauth:0.11
-
cpe:2.3:a:jenkins:github_oauth:0.12
-
cpe:2.3:a:jenkins:github_oauth:0.13
-
cpe:2.3:a:jenkins:github_oauth:0.13.1
-
cpe:2.3:a:jenkins:github_oauth:0.14
-
cpe:2.3:a:jenkins:github_oauth:0.15
-
cpe:2.3:a:jenkins:github_oauth:0.16
-
cpe:2.3:a:jenkins:github_oauth:0.17
-
cpe:2.3:a:jenkins:github_oauth:0.18
-
cpe:2.3:a:jenkins:github_oauth:0.19
-
cpe:2.3:a:jenkins:github_oauth:0.2
-
cpe:2.3:a:jenkins:github_oauth:0.20
-
cpe:2.3:a:jenkins:github_oauth:0.21
-
cpe:2.3:a:jenkins:github_oauth:0.21.1
-
cpe:2.3:a:jenkins:github_oauth:0.21.2
-
cpe:2.3:a:jenkins:github_oauth:0.22
-
cpe:2.3:a:jenkins:github_oauth:0.22.1
-
cpe:2.3:a:jenkins:github_oauth:0.22.2
-
cpe:2.3:a:jenkins:github_oauth:0.22.3
-
cpe:2.3:a:jenkins:github_oauth:0.23
-
cpe:2.3:a:jenkins:github_oauth:0.24
-
cpe:2.3:a:jenkins:github_oauth:0.25
-
cpe:2.3:a:jenkins:github_oauth:0.26
-
cpe:2.3:a:jenkins:github_oauth:0.27
-
cpe:2.3:a:jenkins:github_oauth:0.28
-
cpe:2.3:a:jenkins:github_oauth:0.28.1
-
cpe:2.3:a:jenkins:github_oauth:0.29
-
cpe:2.3:a:jenkins:github_oauth:0.3
-
cpe:2.3:a:jenkins:github_oauth:0.4
-
cpe:2.3:a:jenkins:github_oauth:0.5
-
cpe:2.3:a:jenkins:github_oauth:0.6
-
cpe:2.3:a:jenkins:github_oauth:0.7
-
cpe:2.3:a:jenkins:github_oauth:0.8
-
cpe:2.3:a:jenkins:github_oauth:0.8.1
-
cpe:2.3:a:jenkins:github_oauth:0.9