{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T14:06:19.415","vulnerabilities":[{"cve":{"id":"CVE-2019-10362","sourceIdentifier":"jenkinsci-cert@googlegroups.com","published":"2019-07-31T13:15:12.853","lastModified":"2024-11-21T04:18:58.343","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Jenkins Configuration as Code Plugin 1.24 and earlier did not escape values resulting in variable interpolation during configuration import when exporting, allowing attackers with permission to change Jenkins system configuration to obtain the values of environment variables."},{"lang":"es","value":"La configuración de Jenkins como Plugin Code versión 1.24 y anteriores, no escapó valores que resultaron en una interpolación variable durante la importación de la configuración al exportar, lo que permitió a los atacantes con permiso para cambiar la configuración del sistema de Jenkins obtener los valores de las variables de entorno."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.5}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:N","baseScore":5.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-116"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:jenkins:configuration_as_code:*:*:*:*:*:jenkins:*:*","versionEndIncluding":"1.24","matchCriteriaId":"53B61DCE-5307-493A-9C64-BD26380E2E93"}]}]}],"references":[{"url":"http://www.openwall.com/lists/oss-security/2019/07/31/1","source":"jenkinsci-cert@googlegroups.com","tags":["Mailing List","Third Party Advisory"]},{"url":"https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1446","source":"jenkinsci-cert@googlegroups.com","tags":["Vendor Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2019/07/31/1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1446","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}