CVE-2017-1000092
05.10.2017, 01:29
Git Plugin connects to a user-specified Git repository as part of form validation. An attacker with no direct access to Jenkins but able to guess at a username/password credentials ID could trick a developer with job configuration permissions into following a link with a maliciously crafted Jenkins URL which would result in the Jenkins Git client sending the username and password to an attacker-controlled server.
Vendor | Product | Version |
---|---|---|
jenkins | git | 0.1.0 |
jenkins | git | 0.2.0 |
jenkins | git | 0.3.0 |
jenkins | git | 0.4.0 |
jenkins | git | 0.5.0 |
jenkins | git | 0.6.0 |
jenkins | git | 0.7.0 |
jenkins | git | 0.7.1 |
jenkins | git | 0.7.2 |
jenkins | git | 0.7.3 |
jenkins | git | 0.8.0 |
jenkins | git | 0.8.1 |
jenkins | git | 0.8.2 |
jenkins | git | 0.9.0 |
jenkins | git | 0.9.1 |
jenkins | git | 0.9.2 |
jenkins | git | 1.0.0 |
jenkins | git | 1.0.1 |
jenkins | git | 1.1.0 |
jenkins | git | 1.1.1 |
jenkins | git | 1.1.2 |
jenkins | git | 1.1.3 |
jenkins | git | 1.1.4 |
jenkins | git | 1.1.5 |
jenkins | git | 1.1.6 |
jenkins | git | 1.1.7 |
jenkins | git | 1.1.8 |
jenkins | git | 1.1.9 |
jenkins | git | 1.1.10 |
jenkins | git | 1.1.11 |
jenkins | git | 1.1.12 |
jenkins | git | 1.1.13 |
jenkins | git | 1.1.14 |
jenkins | git | 1.1.15 |
jenkins | git | 1.1.16 |
jenkins | git | 1.1.17 |
jenkins | git | 1.1.18 |
jenkins | git | 1.1.19 |
jenkins | git | 1.1.20 |
jenkins | git | 1.1.21 |
jenkins | git | 1.1.22 |
jenkins | git | 1.1.23 |
jenkins | git | 1.1.24 |
jenkins | git | 1.1.25 |
jenkins | git | 1.1.26 |
jenkins | git | 1.1.27 |
jenkins | git | 1.1.28 |
jenkins | git | 1.1.29 |
jenkins | git | 1.2.0 |
jenkins | git | 1.3.0 |
jenkins | git | 1.4.0 |
jenkins | git | 1.5.0 |
jenkins | git | 1.6.0:beta-1 |
jenkins | git | 2.0.0 |
jenkins | git | 2.0.0:alpha-1 |
jenkins | git | 2.0.0:alpha-2 |
jenkins | git | 2.0.0:beta-2 |
jenkins | git | 2.0.0:beta-3 |
jenkins | git | 2.0.1 |
jenkins | git | 2.0.2 |
jenkins | git | 2.0.3 |
jenkins | git | 2.0.4 |
jenkins | git | 2.1.0 |
jenkins | git | 2.2.0 |
jenkins | git | 2.2.1 |
jenkins | git | 2.2.2 |
jenkins | git | 2.2.3 |
jenkins | git | 2.2.4 |
jenkins | git | 2.2.5 |
jenkins | git | 2.2.6 |
jenkins | git | 2.2.7 |
jenkins | git | 2.2.8 |
jenkins | git | 2.2.9 |
jenkins | git | 2.2.10 |
jenkins | git | 2.2.11 |
jenkins | git | 2.2.12 |
jenkins | git | 2.3.0 |
jenkins | git | 2.3.0:beta-1 |
jenkins | git | 2.3.0:beta-2 |
jenkins | git | 2.3.0:beta-3 |
jenkins | git | 2.3.0:beta-4 |
jenkins | git | 2.3.1 |
jenkins | git | 2.3.2 |
jenkins | git | 2.3.3 |
jenkins | git | 2.3.4 |
jenkins | git | 2.3.5 |
jenkins | git | 2.4.0 |
jenkins | git | 2.4.1 |
jenkins | git | 2.4.2 |
jenkins | git | 2.4.3 |
jenkins | git | 2.4.4 |
jenkins | git | 2.5.0 |
jenkins | git | 2.5.0:beta-1 |
jenkins | git | 2.5.0:beta-2 |
jenkins | git | 2.5.0:beta-3 |
jenkins | git | 2.5.0:beta-4 |
jenkins | git | 2.5.0:beta-5 |
jenkins | git | 2.5.1 |
jenkins | git | 2.5.2 |
jenkins | git | 2.5.3 |
jenkins | git | 2.6.0 |
jenkins | git | 2.6.1 |
jenkins | git | 2.6.2 |
jenkins | git | 2.6.2:beta-1 |
jenkins | git | 2.6.2:beta-2 |
jenkins | git | 2.6.4 |
jenkins | git | 2.6.5 |
jenkins | git | 3.0.0 |
jenkins | git | 3.0.0:beta-1 |
jenkins | git | 3.0.0:beta-2 |
jenkins | git | 3.0.1 |
jenkins | git | 3.0.2 |
jenkins | git | 3.0.2:beta-1 |
jenkins | git | 3.0.2:beta-2 |
jenkins | git | 3.0.3 |
jenkins | git | 3.0.4 |
jenkins | git | 3.0.5 |
jenkins | git | 3.1.0 |
jenkins | git | 3.2.0 |
jenkins | git | 3.3.0 |
jenkins | git | 3.3.1 |
jenkins | git | 3.4.0:alpha-1 |
jenkins | git | 3.4.0:alpha-4 |
jenkins | git | 3.4.0:beta-1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration