CVE-2018-1000110
Description
An improper authorization vulnerability exists in Jenkins Git Plugin version 3.7.0 and earlier in GitStatus.java that allows an attacker with network access to obtain a list of nodes and users.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An improper authorization vulnerability in Jenkins Git Plugin 3.7.0 and earlier allows attackers with network access to obtain a list of nodes and users via GitStatus.java.
Vulnerability
The Jenkins Git Plugin version 3.7.0 and earlier contains an improper authorization vulnerability in GitStatus.java. The GitStatus class extended AbstractModelObject and implemented UnprotectedRootAction, making its endpoint accessible without proper authentication. An attacker with network access can request the Git status page and retrieve a list of nodes and users [2].
Exploitation
An attacker requires only network access to the Jenkins instance. No authentication is needed. By sending an HTTP request to the Git status endpoint (e.g., /git), the attacker can obtain the list of nodes and users [2].
Impact
The attacker gains information disclosure, specifically a list of nodes and users, which could be used for further reconnaissance. The CIA impact is limited to confidentiality of this metadata [2].
Mitigation
The vulnerability is fixed in Git Plugin version 3.8.0 [4]. Users should upgrade to this version or later. If upgrade is not possible, restrict network access to the Jenkins instance or disable the plugin temporarily. The fix removes the UnprotectedRootAction interface and the getSearchUrl method from GitStatus [4].
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jenkins-ci.plugins:gitMaven | < 3.8.0 | 3.8.0 |
Affected products
1Patches
1a3d3a7eb7f75Fix SECURITY-723 - info disclosure over http
3 files changed · +2 −14
pom.xml+1 −1 modified@@ -16,7 +16,7 @@ </licenses> <artifactId>git</artifactId> - <version>3.7.1-SNAPSHOT</version> + <version>3.8.0-SNAPSHOT</version> <packaging>hpi</packaging> <name>Jenkins Git plugin</name> <description>Integrates Jenkins with GIT SCM</description>
src/main/java/hudson/plugins/git/GitStatus.java+1 −7 modified@@ -39,18 +39,12 @@ * Information screen for the use of Git in Hudson. */ @Extension -public class GitStatus extends AbstractModelObject implements UnprotectedRootAction { +public class GitStatus implements UnprotectedRootAction { @Override public String getDisplayName() { return "Git"; } - @Override - public String getSearchUrl() { - return getUrlName(); - } - - @Override public String getIconFileName() { // TODO return null;
src/test/java/hudson/plugins/git/GitStatusTest.java+0 −6 modified@@ -65,12 +65,6 @@ public void testGetDisplayName() { assertEquals("Git", this.gitStatus.getDisplayName()); } - @WithoutJenkins - @Test - public void testGetSearchUrl() { - assertEquals("git", this.gitStatus.getSearchUrl()); - } - @WithoutJenkins @Test public void testGetIconFileName() {
Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4- github.com/advisories/GHSA-46p2-fwqg-3h6mghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2018-1000110ghsaADVISORY
- github.com/jenkinsci/git-plugin/commit/a3d3a7eb7f75bfe97a0291e3b6d074aafafa86c9ghsaWEB
- jenkins.io/security/advisory/2018-02-26/ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.