Description
The Jenkins 2.73.1 and earlier, 2.83 and earlier default form control for passwords and other secrets, <f:password/>, supports form validation (e.g. for API keys). The form validation AJAX requests were sent via GET, which could result in secrets being logged to a HTTP access log in non-default configurations of Jenkins, and made available to users with access to these log files. Form validation for <f:password/> is now always sent via POST, which is typically not logged.
Remediation
References
Related Vulnerabilities
phpList Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2014-2916)
Envoy Proxy Uncontrolled Resource Consumption Vulnerability (CVE-2023-44487)
Oracle Database Server CVE-2014-4291 Vulnerability (CVE-2014-4291)
WordPress Plugin WP Symposium Arbitrary File Upload (14.11)
WordPress Improper Privilege Management Vulnerability (CVE-2020-28036)