Vulnerabilities (CVE)

Filtered by vendor Jenkins Subscribe
Filtered by product Repository Connector
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-34195 1 Jenkins 1 Repository Connector 2023-12-21 3.5 LOW 5.4 MEDIUM
Jenkins Repository Connector Plugin 2.2.0 and earlier does not escape the name and description of Maven Repository Artifact parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
CVE-2022-36903 1 Jenkins 1 Repository Connector 2023-12-10 N/A 4.3 MEDIUM
A missing permission check in Jenkins Repository Connector Plugin 2.2.0 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
CVE-2022-36904 1 Jenkins 1 Repository Connector 2023-12-10 N/A 4.3 MEDIUM
Jenkins Repository Connector Plugin 2.2.0 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
CVE-2021-21618 1 Jenkins 1 Repository Connector 2023-12-10 3.5 LOW 5.4 MEDIUM
Jenkins Repository Connector Plugin 2.0.2 and earlier does not escape parameter names and descriptions for past builds, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
CVE-2020-2149 1 Jenkins 1 Repository Connector 2023-12-10 5.0 MEDIUM 5.3 MEDIUM
Jenkins Repository Connector Plugin 1.2.6 and earlier transmits configured credentials in plain text as part of its global Jenkins configuration form, potentially resulting in their exposure.
CVE-2019-1003038 1 Jenkins 1 Repository Connector 2023-12-10 2.1 LOW 7.8 HIGH
An insufficiently protected credentials vulnerability exists in Jenkins Repository Connector Plugin 1.2.4 and earlier in src/main/java/org/jvnet/hudson/plugins/repositoryconnector/ArtifactDeployer.java, src/main/java/org/jvnet/hudson/plugins/repositoryconnector/Repository.java, src/main/java/org/jvnet/hudson/plugins/repositoryconnector/UserPwd.java that allows an attacker with local file system access or control of a Jenkins administrator's web browser (e.g. malicious extension) to retrieve the password stored in the plugin configuration.