CVE-2018-1000410: Exposure of Sensitive Information to an Unauthorized Actor in Jenkins
7.8
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.32928%
CWE
Published
5/14/2022
Updated
12/18/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.main:jenkins-core | maven | <= 2.138.1 | 2.138.2 |
org.jenkins-ci.main:jenkins-core | maven | >= 2.140, <= 2.145 | 2.146 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from unsanitized form data being included in error messages. The key evidence is the patch modifying Descriptor.java
's newInstance
method to use RedactSecretJsonInErrorMessageSanitizer
when formatting error messages - this directly addresses credential leakage. The advisory also explicitly calls out RequestImpl.java
as part of the vulnerable code path, though its exact vulnerable function isn't visible in the provided diff. The high confidence for Descriptor.newInstance
comes from the direct code change observed; medium confidence for RequestImpl
comes from advisory attribution but lack of specific pre-patch code examples.