Filtered by vendor Jenkins
Subscribe
Total
1603 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-32998 | 1 Jenkins | 1 Appspider | 2023-12-10 | N/A | 8.8 HIGH |
A cross-site request forgery (CSRF) vulnerability in Jenkins AppSpider Plugin 1.0.15 and earlier allows attackers to connect to an attacker-specified URL and send an HTTP POST request with a JSON payload consisting of attacker-specified credentials. | |||||
CVE-2023-33001 | 1 Jenkins | 1 Hashicorp Vault | 2023-12-10 | N/A | 7.5 HIGH |
Jenkins HashiCorp Vault Plugin 360.v0a_1c04cf807d and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log when push mode for durable task logging is enabled. | |||||
CVE-2023-28678 | 1 Jenkins | 1 Cppcheck | 2023-12-10 | N/A | 5.4 MEDIUM |
Jenkins Cppcheck Plugin 1.26 and earlier does not escape file names from Cppcheck report files before showing them on the Jenkins UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control report file contents. | |||||
CVE-2023-30513 | 1 Jenkins | 1 Kubernetes | 2023-12-10 | N/A | 7.5 HIGH |
Jenkins Kubernetes Plugin 3909.v1f2c633e8590 and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log when push mode for durable task logging is enabled. | |||||
CVE-2023-30528 | 1 Jenkins | 1 Wso2 Oauth | 2023-12-10 | N/A | 6.5 MEDIUM |
Jenkins WSO2 Oauth Plugin 1.0 and earlier does not mask the WSO2 Oauth client secret on the global configuration form, increasing the potential for attackers to observe and capture it. | |||||
CVE-2023-33003 | 1 Jenkins | 1 Tag Profiler | 2023-12-10 | N/A | 4.3 MEDIUM |
A cross-site request forgery (CSRF) vulnerability in Jenkins Tag Profiler Plugin 0.2 and earlier allows attackers to reset profiler statistics. | |||||
CVE-2023-30525 | 1 Jenkins | 1 Report Portal | 2023-12-10 | N/A | 8.8 HIGH |
A cross-site request forgery (CSRF) vulnerability in Jenkins Report Portal Plugin 0.5 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified bearer token authentication. | |||||
CVE-2023-32986 | 1 Jenkins | 1 File Parameters | 2023-12-10 | N/A | 8.8 HIGH |
Jenkins File Parameter Plugin 285.v757c5b_67a_c25 and earlier does not restrict the name (and resulting uploaded file name) of Stashed File Parameters, allowing attackers with Item/Configure permission to create or replace arbitrary files on the Jenkins controller file system with attacker-specified content. | |||||
CVE-2023-32979 | 1 Jenkins | 1 Email Extension | 2023-12-10 | N/A | 4.3 MEDIUM |
Jenkins Email Extension Plugin does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of files in the email-templates/ directory in the Jenkins home directory on the controller file system. | |||||
CVE-2023-32989 | 1 Jenkins | 1 Azure Vm Agents | 2023-12-10 | N/A | 8.8 HIGH |
A cross-site request forgery (CSRF) vulnerability in Jenkins Azure VM Agents Plugin 852.v8d35f0960a_43 and earlier allows attackers to connect to an attacker-specified Azure Cloud server using attacker-specified credentials IDs obtained through another method. | |||||
CVE-2023-28669 | 1 Jenkins | 1 Jacoco | 2023-12-10 | N/A | 5.4 MEDIUM |
Jenkins JaCoCo Plugin 3.3.2 and earlier does not escape class and method names shown on the UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control input files for the 'Record JaCoCo coverage report' post-build action. | |||||
CVE-2023-28682 | 1 Jenkins | 1 Performance Publisher | 2023-12-10 | N/A | 8.2 HIGH |
Jenkins Performance Publisher Plugin 8.09 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2023-32980 | 1 Jenkins | 1 Email Extension | 2023-12-10 | N/A | 4.3 MEDIUM |
A cross-site request forgery (CSRF) vulnerability in Jenkins Email Extension Plugin allows attackers to make another user stop watching an attacker-specified job. | |||||
CVE-2023-32982 | 1 Jenkins | 1 Ansible | 2023-12-10 | N/A | 4.3 MEDIUM |
Jenkins Ansible Plugin 204.v8191fd551eb_f and earlier stores extra variables unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system. | |||||
CVE-2023-32993 | 1 Jenkins | 1 Saml Single Sign On | 2023-12-10 | N/A | 4.8 MEDIUM |
Jenkins SAML Single Sign On(SSO) Plugin 2.0.2 and earlier does not perform hostname validation when connecting to miniOrange or the configured IdP to retrieve SAML metadata, which could be abused using a man-in-the-middle attack to intercept these connections. | |||||
CVE-2023-32977 | 1 Jenkins | 1 Pipeline\ | 2023-12-10 | N/A | 5.4 MEDIUM |
Jenkins Pipeline: Job Plugin does not escape the display name of the build that caused an earlier build to be aborted, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to set build display names immediately. | |||||
CVE-2023-2633 | 1 Jenkins | 1 Code Dx | 2023-12-10 | N/A | 4.3 MEDIUM |
Jenkins Code Dx Plugin 3.1.0 and earlier does not mask Code Dx server API keys displayed on the configuration form, increasing the potential for attackers to observe and capture them. | |||||
CVE-2023-33004 | 1 Jenkins | 1 Tag Profiler | 2023-12-10 | N/A | 4.3 MEDIUM |
A missing permission check in Jenkins Tag Profiler Plugin 0.2 and earlier allows attackers with Overall/Read permission to reset profiler statistics. | |||||
CVE-2023-30532 | 1 Jenkins | 1 Turboscript | 2023-12-10 | N/A | 6.5 MEDIUM |
A missing permission check in Jenkins TurboScript Plugin 1.3 and earlier allows attackers with Item/Read permission to trigger builds of jobs corresponding to the attacker-specified repository. | |||||
CVE-2023-35149 | 1 Jenkins | 1 Digital.ai App Management Publisher | 2023-12-10 | N/A | 6.5 MEDIUM |
A missing permission check in Jenkins Digital.ai App Management Publisher Plugin 2.6 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL, capturing credentials stored in Jenkins. |