Filtered by vendor Jenkins
Subscribe
Total
1647 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-10380 | 1 Jenkins | 1 Simple Travis Pipeline Runner | 2023-10-25 | 6.5 MEDIUM | 8.8 HIGH |
Jenkins Simple Travis Pipeline Runner Plugin 1.0 and earlier specifies unsafe values in its custom Script Security whitelist, allowing attackers able to execute Script Security protected scripts to execute arbitrary code. | |||||
CVE-2019-1003050 | 3 Jenkins, Oracle, Redhat | 3 Jenkins, Communications Cloud Native Core Automated Test Suite, Openshift Container Platform | 2023-10-25 | 3.5 LOW | 5.4 MEDIUM |
The f:validateButton form control for the Jenkins UI did not properly escape job URLs in Jenkins 2.171 and earlier and Jenkins LTS 2.164.1 and earlier, resulting in a cross-site scripting (XSS) vulnerability exploitable by users with the ability to control job names. | |||||
CVE-2020-2092 | 1 Jenkins | 1 Robot Framework | 2023-10-25 | 6.5 MEDIUM | 8.8 HIGH |
Jenkins Robot Framework Plugin 2.0.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks, allowing users with Job/Configure to have Jenkins parse crafted XML documents. | |||||
CVE-2019-1003089 | 1 Jenkins | 1 Upload To Pgyer | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Upload to pgyer Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2019-10412 | 1 Jenkins | 1 Inedo Proget | 2023-10-25 | 5.0 MEDIUM | 7.5 HIGH |
Jenkins Inedo ProGet Plugin 1.2 and earlier transmitted configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure. | |||||
CVE-2019-10302 | 1 Jenkins | 1 Jira-ext | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins jira-ext Plugin 0.8 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system. | |||||
CVE-2019-10470 | 1 Jenkins | 1 Kubernetes Ci | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
A missing permission check in Jenkins ElasticBox Jenkins Kubernetes CI/CD Plugin in form-related methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins. | |||||
CVE-2019-1003054 | 1 Jenkins | 1 Jira Issue Updater | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins Jira Issue Updater Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2019-10399 | 1 Jenkins | 1 Script Security | 2023-10-25 | 4.9 MEDIUM | 4.2 MEDIUM |
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of property names in property expressions in increment and decrement expressions allowed attackers to execute arbitrary code in sandboxed scripts. | |||||
CVE-2019-10348 | 1 Jenkins | 1 Gogs | 2023-10-25 | 4.0 MEDIUM | 8.8 HIGH |
Jenkins Gogs Plugin stored credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2021-21671 | 1 Jenkins | 1 Jenkins | 2023-10-25 | 5.1 MEDIUM | 7.5 HIGH |
Jenkins 2.299 and earlier, LTS 2.289.1 and earlier does not invalidate the previous session on login. | |||||
CVE-2019-10362 | 1 Jenkins | 1 Configuration As Code | 2023-10-25 | 5.5 MEDIUM | 5.4 MEDIUM |
Jenkins Configuration as Code Plugin 1.24 and earlier did not escape values resulting in variable interpolation during configuration import when exporting, allowing attackers with permission to change Jenkins system configuration to obtain the values of environment variables. | |||||
CVE-2019-1003087 | 1 Jenkins | 1 Chef Sinatra | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
A missing permission check in Jenkins Chef Sinatra Plugin in the ChefBuilderConfiguration.DescriptorImpl#doTestConnection form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server. | |||||
CVE-2020-2209 | 1 Jenkins | 1 Testcomplete Support | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins TestComplete support Plugin 2.4.1 and earlier stores a password unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2019-1003088 | 1 Jenkins | 1 Fabric Beta Publisher | 2023-10-25 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Fabric Beta Publisher Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2020-2180 | 1 Jenkins | 1 Amazon Web Services Serverless Application Model | 2023-10-25 | 6.5 MEDIUM | 8.8 HIGH |
Jenkins AWS SAM Plugin 1.2.2 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability. | |||||
CVE-2019-10340 | 1 Jenkins | 1 Docker | 2023-10-25 | 6.8 MEDIUM | 8.8 HIGH |
A cross-site request forgery vulnerability in Jenkins Docker Plugin 1.1.6 and earlier in DockerAPI.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | |||||
CVE-2021-21609 | 1 Jenkins | 1 Jenkins | 2023-10-25 | 5.0 MEDIUM | 5.3 MEDIUM |
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not correctly match requested URLs to the list of always accessible paths, allowing attackers without Overall/Read permission to access some URLs as if they did have Overall/Read permission. | |||||
CVE-2020-2095 | 1 Jenkins | 1 Redgate Sql Change Automation | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
Jenkins Redgate SQL Change Automation Plugin 2.0.4 and earlier stored an API key unencrypted in job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system. | |||||
CVE-2019-10445 | 1 Jenkins | 1 Google Kubernetes Engine | 2023-10-25 | 4.0 MEDIUM | 4.3 MEDIUM |
A missing permission check in Jenkins Google Kubernetes Engine Plugin 0.7.0 and earlier allowed attackers with Overall/Read permission to obtain limited information about the scope of a credential with an attacker-specified credentials ID. |