cvelist/2018/1000xxx/CVE-2018-1000601.json

65 lines
2.1 KiB
JSON
Raw Normal View History

2018-06-26 13:04:14 -04:00
{
2019-03-18 03:31:55 +00:00
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-06-25T11:12:00.700012",
"DATE_REQUESTED": "2018-06-25T00:00:00",
"ID": "CVE-2018-1000601",
"REQUESTER": "ml@beckweb.net",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2018-06-26 13:04:14 -04:00
{
2019-03-18 03:31:55 +00:00
"lang": "eng",
"value": "A arbitrary file read vulnerability exists in Jenkins SSH Credentials Plugin 1.13 and earlier in BasicSSHUserPrivateKey.java that allows attackers with a Jenkins account and the permission to configure credential bindings to read arbitrary files from the Jenkins master file system."
2018-06-26 13:04:14 -04:00
}
2019-03-18 03:31:55 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://jenkins.io/security/advisory/2018-06-25/#SECURITY-440",
"refsource": "CONFIRM",
"url": "https://jenkins.io/security/advisory/2018-06-25/#SECURITY-440"
}
]
}
}