{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-27T04:04:57.936","vulnerabilities":[{"cve":{"id":"CVE-2024-39458","sourceIdentifier":"jenkinsci-cert@googlegroups.com","published":"2024-06-26T17:15:27.020","lastModified":"2025-10-10T15:34:58.517","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"When Jenkins Structs Plugin 337.v1b_04ea_4df7c8 and earlier fails to configure a build step, it logs a warning message containing diagnostic information that may contain secrets passed as step parameters, potentially resulting in accidental exposure of secrets through the default system log."},{"lang":"es","value":" Cuando el complemento Jenkins Structs 337.v1b_04ea_4df7c8 y versiones anteriores no logra configurar un paso de compilación, registra un mensaje de advertencia que contiene información de diagnóstico que puede contener secretos pasados como parámetros de paso, lo que podría provocar la exposición accidental de secretos a través del registro predeterminado del sistema."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N","baseScore":3.1,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.6,"impactScore":1.4}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-209"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:jenkins:structs:*:*:*:*:*:jenkins:*:*","versionEndIncluding":"337.v1b_04ea_4df7c8","matchCriteriaId":"1A0A08D5-CB09-4A74-8680-12070D1A8C33"}]}]}],"references":[{"url":"http://www.openwall.com/lists/oss-security/2024/06/26/2","source":"jenkinsci-cert@googlegroups.com","tags":["Mailing List"]},{"url":"https://www.jenkins.io/security/advisory/2024-06-26/#SECURITY-3371","source":"jenkinsci-cert@googlegroups.com","tags":["Vendor Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2024/06/26/2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"]},{"url":"https://www.jenkins.io/security/advisory/2024-06-26/#SECURITY-3371","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}