Filtered by vendor Jenkins
Subscribe
Total
1603 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-28684 | 1 Jenkins | 1 Remote-jobs-view | 2023-04-09 | N/A | 6.5 MEDIUM |
Jenkins remote-jobs-view-plugin Plugin 0.0.3 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2023-28676 | 1 Jenkins | 1 Convert To Pipeline | 2023-04-08 | N/A | 8.8 HIGH |
A cross-site request forgery (CSRF) vulnerability in Jenkins Convert To Pipeline Plugin 1.0 and earlier allows attackers to create a Pipeline based on a Freestyle project, potentially leading to remote code execution (RCE). | |||||
CVE-2023-28680 | 1 Jenkins | 1 Crap4j | 2023-04-08 | N/A | 7.5 HIGH |
Jenkins Crap4J Plugin 0.9 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2023-28679 | 1 Jenkins | 1 Mashup Portlets | 2023-04-08 | N/A | 5.4 MEDIUM |
Jenkins Mashup Portlets Plugin 1.1.2 and earlier provides the "Generic JS Portlet" feature that lets a user populate a portlet using a custom JavaScript expression, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by authenticated attackers with Overall/Read permission. | |||||
CVE-2023-28678 | 1 Jenkins | 1 Cppcheck | 2023-04-08 | N/A | 5.4 MEDIUM |
Jenkins Cppcheck Plugin 1.26 and earlier does not escape file names from Cppcheck report files before showing them on the Jenkins UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control report file contents. | |||||
CVE-2023-28675 | 1 Jenkins | 1 Octoperf Load Testing | 2023-04-08 | N/A | 4.3 MEDIUM |
A missing permission check in Jenkins OctoPerf Load Testing Plugin Plugin 4.5.2 and earlier allows attackers to connect to a previously configured Octoperf server using attacker-specified credentials. | |||||
CVE-2023-28674 | 1 Jenkins | 1 Octoperf Load Testing | 2023-04-08 | N/A | 8.8 HIGH |
A cross-site request forgery (CSRF) vulnerability in Jenkins OctoPerf Load Testing Plugin Plugin 4.5.2 and earlier allows attackers to connect to a previously configured Octoperf server using attacker-specified credentials. | |||||
CVE-2023-28673 | 1 Jenkins | 1 Octoperf Load Testing | 2023-04-08 | N/A | 4.3 MEDIUM |
A missing permission check in Jenkins OctoPerf Load Testing Plugin Plugin 4.5.2 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | |||||
CVE-2023-28672 | 1 Jenkins | 1 Octoperf Load Testing | 2023-04-07 | N/A | 6.5 MEDIUM |
Jenkins OctoPerf Load Testing Plugin Plugin 4.5.1 and earlier does not perform a permission check in a connection test HTTP endpoint, allowing attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | |||||
CVE-2023-28670 | 1 Jenkins | 1 Pipeline Aggregator View | 2023-04-07 | N/A | 5.4 MEDIUM |
Jenkins Pipeline Aggregator View Plugin 1.13 and earlier does not escape a variable representing the current view's URL in inline JavaScript, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by authenticated attackers with Overall/Read permission. | |||||
CVE-2023-28671 | 1 Jenkins | 1 Octoperf Load Testing | 2023-04-07 | N/A | 4.3 MEDIUM |
A cross-site request forgery (CSRF) vulnerability in Jenkins OctoPerf Load Testing Plugin Plugin 4.5.0 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | |||||
CVE-2023-28669 | 1 Jenkins | 1 Jacoco | 2023-04-07 | N/A | 5.4 MEDIUM |
Jenkins JaCoCo Plugin 3.3.2 and earlier does not escape class and method names shown on the UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control input files for the 'Record JaCoCo coverage report' post-build action. | |||||
CVE-2023-28668 | 1 Jenkins | 1 Role-based Authorization Strategy | 2023-04-07 | N/A | 9.8 CRITICAL |
Jenkins Role-based Authorization Strategy Plugin 587.v2872c41fa_e51 and earlier grants permissions even after they've been disabled. | |||||
CVE-2023-28685 | 1 Jenkins | 1 Absint A3 | 2023-03-24 | N/A | 7.1 HIGH |
Jenkins AbsInt a³ Plugin 1.1.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | |||||
CVE-2023-27902 | 1 Jenkins | 1 Jenkins | 2023-03-16 | N/A | 4.3 MEDIUM |
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier shows temporary directories related to job workspaces, which allows attackers with Item/Workspace permission to access their contents. | |||||
CVE-2023-27901 | 1 Jenkins | 1 Jenkins | 2023-03-16 | N/A | 7.5 HIGH |
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier uses the Apache Commons FileUpload library without specifying limits for the number of request parts introduced in version 1.5 for CVE-2023-24998 in org.kohsuke.stapler.RequestImpl, allowing attackers to trigger a denial of service. | |||||
CVE-2023-27900 | 1 Jenkins | 1 Jenkins | 2023-03-16 | N/A | 7.5 HIGH |
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier uses the Apache Commons FileUpload library without specifying limits for the number of request parts introduced in version 1.5 for CVE-2023-24998 in hudson.util.MultipartFormDataParser, allowing attackers to trigger a denial of service. | |||||
CVE-2023-27899 | 1 Jenkins | 1 Jenkins | 2023-03-16 | N/A | 7.0 HIGH |
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier creates a temporary file in the default temporary directory with the default permissions for newly created files when uploading a plugin for installation, potentially allowing attackers with access to the Jenkins controller file system to read and write the file before it is used, potentially resulting in arbitrary code execution. | |||||
CVE-2023-27903 | 1 Jenkins | 1 Jenkins | 2023-03-15 | N/A | 4.4 MEDIUM |
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier creates a temporary file in the default temporary directory with the default permissions for newly created files when uploading a file parameter through the CLI, potentially allowing attackers with access to the Jenkins controller file system to read and write the file before it is used. | |||||
CVE-2023-27904 | 1 Jenkins | 1 Jenkins | 2023-03-15 | N/A | 5.3 MEDIUM |
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier prints an error stack trace on agent-related pages when agent connections are broken, potentially revealing information about Jenkins configuration that is otherwise inaccessible to attackers. |