Jenkins Configuration as Code Plugin 1.24 and earlier did not escape values resulting in variable interpolation during configuration import when exporting, allowing attackers with permission to change Jenkins system configuration to obtain the values of environment variables.
The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2019/07/31/1 | third party advisory mailing list |
https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1446 | vendor advisory |