The Jenkins 2.73.1 and earlier, 2.83 and earlier default form control for passwords and other secrets, <f:password/>, supports form validation (e.g. for API keys). The form validation AJAX requests were sent via GET, which could result in secrets being logged to a HTTP access log in non-default configurations of Jenkins, and made available to users with access to these log files. Form validation for <f:password/> is now always sent via POST, which is typically not logged.
References
Link Resource
https://jenkins.io/security/advisory/2017-10-11/ Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2018-01-26T02:00:00

Updated: 2018-01-26T01:57:01

Reserved: 2017-11-29T00:00:00


Link: CVE-2017-1000401

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2018-01-26T02:29:01.203

Modified: 2019-05-08T22:24:13.173


Link: CVE-2017-1000401

JSON object: View

cve-icon Redhat Information

No data.

CWE