Improper Input Validation in Jenkins
Low severity
GitHub Reviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Jan 27, 2023
Package
Affected versions
<= 2.73.1
>= 2.74, <= 2.83
Patched versions
2.73.2
2.84
Description
Published by the National Vulnerability Database
Jan 26, 2018
Published to the GitHub Advisory Database
May 14, 2022
Reviewed
Jul 1, 2022
Last updated
Jan 27, 2023
The Jenkins 2.73.1 and earlier, 2.83 and earlier default form control for passwords and other secrets, <f:password/>, supports form validation (e.g. for API keys). The form validation AJAX requests were sent via GET, which could result in secrets being logged to a HTTP access log in non-default configurations of Jenkins, and made available to users with access to these log files. Form validation for <f:password/> is now always sent via POST, which is typically not logged.
References