CVE-2017-1000108

The Pipeline: Input Step Plugin by default allowed users with Item/Read access to a pipeline to interact with the step to provide input. This has been changed, and now requires users to have the Item/Build permission instead.
References
Link Resource
https://jenkins.io/security/advisory/2017-08-07/ Vendor Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:jenkins:pipeline-input-step:2.6:*:*:*:*:jenkins:*:*
cpe:2.3:a:jenkins:pipeline-input-step:2.5:*:*:*:*:jenkins:*:*
cpe:2.3:a:jenkins:pipeline-input-step:2.4:*:*:*:*:jenkins:*:*
cpe:2.3:a:jenkins:pipeline-input-step:2.3:*:*:*:*:jenkins:*:*
cpe:2.3:a:jenkins:pipeline-input-step:2.2:*:*:*:*:jenkins:*:*
cpe:2.3:a:jenkins:pipeline-input-step:2.1:*:*:*:*:jenkins:*:*
cpe:2.3:a:jenkins:pipeline-input-step:2.7:*:*:*:*:jenkins:*:*
cpe:2.3:a:jenkins:pipeline-input-step:2.0:*:*:*:*:jenkins:*:*

Information

Published : 2017-10-04 18:29

Updated : 2017-11-01 06:54


NVD link : CVE-2017-1000108

Mitre link : CVE-2017-1000108


JSON object : View

CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

Advertisement

dedicated server usa

Products Affected

jenkins

  • pipeline-input-step