Filtered by vendor Jenkins
Subscriptions
Total
1603 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-28675 | 1 Jenkins | 1 Octoperf Load Testing | 2023-10-24 | 4.3 Medium |
A missing permission check in Jenkins OctoPerf Load Testing Plugin Plugin 4.5.2 and earlier allows attackers to connect to a previously configured Octoperf server using attacker-specified credentials. | ||||
CVE-2023-28674 | 1 Jenkins | 1 Octoperf Load Testing | 2023-10-24 | 8.8 High |
A cross-site request forgery (CSRF) vulnerability in Jenkins OctoPerf Load Testing Plugin Plugin 4.5.2 and earlier allows attackers to connect to a previously configured Octoperf server using attacker-specified credentials. | ||||
CVE-2023-28673 | 1 Jenkins | 1 Octoperf Load Testing | 2023-10-24 | 4.3 Medium |
A missing permission check in Jenkins OctoPerf Load Testing Plugin Plugin 4.5.2 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | ||||
CVE-2023-28672 | 1 Jenkins | 1 Octoperf Load Testing | 2023-10-24 | 6.5 Medium |
Jenkins OctoPerf Load Testing Plugin Plugin 4.5.1 and earlier does not perform a permission check in a connection test HTTP endpoint, allowing attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | ||||
CVE-2023-28671 | 1 Jenkins | 1 Octoperf Load Testing | 2023-10-24 | 4.3 Medium |
A cross-site request forgery (CSRF) vulnerability in Jenkins OctoPerf Load Testing Plugin Plugin 4.5.0 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | ||||
CVE-2023-28670 | 1 Jenkins | 1 Pipeline Aggregator View | 2023-10-24 | 5.4 Medium |
Jenkins Pipeline Aggregator View Plugin 1.13 and earlier does not escape a variable representing the current view's URL in inline JavaScript, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by authenticated attackers with Overall/Read permission. | ||||
CVE-2023-28669 | 1 Jenkins | 1 Jacoco | 2023-10-24 | 5.4 Medium |
Jenkins JaCoCo Plugin 3.3.2 and earlier does not escape class and method names shown on the UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control input files for the 'Record JaCoCo coverage report' post-build action. | ||||
CVE-2023-28668 | 1 Jenkins | 1 Role-based Authorization Strategy | 2023-10-24 | 9.8 Critical |
Jenkins Role-based Authorization Strategy Plugin 587.v2872c41fa_e51 and earlier grants permissions even after they've been disabled. | ||||
CVE-2023-27905 | 1 Jenkins | 1 Update-center2 | 2023-10-24 | 9.6 Critical |
Jenkins update-center2 3.13 and 3.14 renders the required Jenkins core version on plugin download index pages without sanitization, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide a plugin for hosting. | ||||
CVE-2023-27904 | 1 Jenkins | 1 Jenkins | 2023-10-24 | 5.3 Medium |
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier prints an error stack trace on agent-related pages when agent connections are broken, potentially revealing information about Jenkins configuration that is otherwise inaccessible to attackers. | ||||
CVE-2023-27903 | 1 Jenkins | 1 Jenkins | 2023-10-24 | 4.4 Medium |
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier creates a temporary file in the default temporary directory with the default permissions for newly created files when uploading a file parameter through the CLI, potentially allowing attackers with access to the Jenkins controller file system to read and write the file before it is used. | ||||
CVE-2023-27902 | 1 Jenkins | 1 Jenkins | 2023-10-24 | 4.3 Medium |
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier shows temporary directories related to job workspaces, which allows attackers with Item/Workspace permission to access their contents. | ||||
CVE-2023-27901 | 1 Jenkins | 1 Jenkins | 2023-10-24 | 7.5 High |
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier uses the Apache Commons FileUpload library without specifying limits for the number of request parts introduced in version 1.5 for CVE-2023-24998 in org.kohsuke.stapler.RequestImpl, allowing attackers to trigger a denial of service. | ||||
CVE-2023-27900 | 1 Jenkins | 1 Jenkins | 2023-10-24 | 7.5 High |
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier uses the Apache Commons FileUpload library without specifying limits for the number of request parts introduced in version 1.5 for CVE-2023-24998 in hudson.util.MultipartFormDataParser, allowing attackers to trigger a denial of service. | ||||
CVE-2023-27899 | 1 Jenkins | 1 Jenkins | 2023-10-24 | 7.0 High |
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier creates a temporary file in the default temporary directory with the default permissions for newly created files when uploading a plugin for installation, potentially allowing attackers with access to the Jenkins controller file system to read and write the file before it is used, potentially resulting in arbitrary code execution. | ||||
CVE-2023-27898 | 1 Jenkins | 1 Jenkins | 2023-10-24 | 9.6 Critical |
Jenkins 2.270 through 2.393 (both inclusive), LTS 2.277.1 through 2.375.3 (both inclusive) does not escape the Jenkins version a plugin depends on when rendering the error message stating its incompatibility with the current version of Jenkins, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide plugins to the configured update sites and have this message shown by Jenkins instances. | ||||
CVE-2023-24459 | 1 Jenkins | 1 Bearychat | 2023-10-24 | 6.5 Medium |
A missing permission check in Jenkins BearyChat Plugin 3.0.2 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL. | ||||
CVE-2023-24458 | 1 Jenkins | 1 Bearychat | 2023-10-24 | 8.8 High |
A cross-site request forgery (CSRF) vulnerability in Jenkins BearyChat Plugin 3.0.2 and earlier allows attackers to connect to an attacker-specified URL. | ||||
CVE-2023-24457 | 1 Jenkins | 1 Keycloak Authentication | 2023-10-24 | 6.5 Medium |
A cross-site request forgery (CSRF) vulnerability in Jenkins Keycloak Authentication Plugin 2.3.0 and earlier allows attackers to trick users into logging in to the attacker's account. | ||||
CVE-2023-24456 | 1 Jenkins | 1 Keycloak Authentication | 2023-10-24 | 9.8 Critical |
Jenkins Keycloak Authentication Plugin 2.3.0 and earlier does not invalidate the previous session on login. |