CVE-2018-1000150

Source
https://cve.org/CVERecord?id=CVE-2018-1000150
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-1000150.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2018-1000150
Aliases
Published
2018-04-05T13:29:00.700Z
Modified
2025-11-14T03:33:46.229702Z
Severity
  • 3.3 (Low) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

An exposure of sensitive information vulnerability exists in Jenkins Reverse Proxy Auth Plugin 1.5 and older in ReverseProxySecurityRealm#authContext that allows attackers with local file system access to obtain a list of authorities for logged in users.

References

Affected packages

Git / github.com/jenkinsci/reverse-proxy-auth-plugin

Affected ranges

Type
GIT
Repo
https://github.com/jenkinsci/reverse-proxy-auth-plugin
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-1000150.json"