Show plain JSON{"id": "CVE-2018-1000401", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 2.1, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.8}]}, "published": "2018-07-09T13:29:00.210", "references": [{"url": "https://jenkins.io/security/advisory/2018-06-25/#SECURITY-967", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://jenkins.io/security/advisory/2018-06-25/#SECURITY-967", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-522"}]}], "descriptions": [{"lang": "en", "value": "Jenkins project Jenkins AWS CodePipeline Plugin version 0.36 and earlier contains a Insufficiently Protected Credentials vulnerability in AWSCodePipelineSCM.java that can result in Credentials Disclosure. This attack appear to be exploitable via local file access. This vulnerability appears to have been fixed in 0.37 and later."}, {"lang": "es", "value": "El plugin Jenkins AWS CodePipeline, en versiones 0.36 y anteriores, en Jenkins, contiene una vulnerabilidad de credenciales protegidas insuficientemente en AWSCodePipelineSCM.java que puede resultar en una divulgaci\u00f3n de credenciales. Parece ser que este ataque puede ser explotado mediante el acceso local a los archivos. La vulnerabilidad parece haber sido solucionada en la versi\u00f3n 0.37 y siguientes."}], "lastModified": "2024-11-21T03:39:59.357", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:jenkins:aws_codepipeline:*:*:*:*:*:jenkins:*:*", "vulnerable": true, "matchCriteriaId": "D53150F9-3CAE-4549-9837-960D3C529754", "versionEndIncluding": "0.36"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}