Skip to content

TechMedia

Header Image
Archive

Month: May 2022

376 Posts

Featured

Posted byWpmaster
ウクライナ戦争に見るワイパー攻撃の実態とデジタル情報操作
Posted byWpmaster
「エースコンバット」と「トップガン マーヴェリック」が夢のコラボ!マーヴェリックスキンの「F-14A Tomcat」や「F/A-18E Super Hornet」が登場!
Posted byWpmaster
高橋幸宏、ソロ活動50周年記念!『T.E.N.T Years Vinyl Box』収録ライブ音源の詳細発表!
Posted byWpmaster
[camaleon_cms] Camaleon CMS Stored Cross-site Scripting vulnerability

[org.jenkins-ci.plugins:release] Stored XSS vulnerability in Jenkins Release Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/22/2022

Jenkins Release Plugin 2.10.2 and earlier does not escape the release version in badge tooltip, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Release/Release permission.
References

https://nvd.nist.gov/vu…

[org.jenkins-ci.plugins:couchdb-statistics] Password stored in plain text by Jenkins couchdb-statistics Plugin

  • Posted inLOW
  • Posted byWpmaster
  • 05/25/202212/22/2022

couchdb-statistics Plugin 0.3 and earlier stores its server password unencrypted in its global configuration file org.jenkinsci.plugins.couchstats.CouchStatsConfig.xml on the Jenkins controller as part of its configuration.
This password can be viewed …

[org.biouno:uno-choice] Stored XSS vulnerability in Jenkins Active Choices Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/22/2022

Active Choices Plugin 2.4 and earlier does not escape the name and description of build parameters.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
Active Choices Plugin 2.5 esca…

[org.jenkins-ci.plugins:audit-trail] Incorrect default pattern in Jenkins Audit Trail Plugin

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202212/22/2022

Audit Trail Plugin uses regular expressions to match requested URLs whose dispatch should be logged.
In Audit Trail Plugin 3.6 and earlier, the default regular expression pattern could be bypassed in many cases by adding a suffix to the URL that would …

[org.biouno:uno-choice] Stored XSS vulnerability in Jenkins Active Choices Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/22/2022

Active Choices Plugin 2.4 and earlier does not escape List and Map return values of sandboxed scripts for Reactive Reference Parameter.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permis…

[org.jenkins-ci.plugins:role-strategy] Improper authorization due to caching in Jenkins Role-based Authorization Strategy Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/21/2022

Role-based Authorization Strategy Plugin 2.12 and newer uses a cache to speed up permission lookups. Role-based Authorization Strategy Plugin 3.0 and earlier this cache is not invalidated properly when an administrator changes the permission configurat…

[org.6wind.jenkins:lockable-resources] CSRF vulnerability in Jenkins Lockable Resources Plugin

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202201/13/2023

Lockable Resources Plugin 2.8 and earlier does not require POST requests for several HTTP endpoints, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to reserve, unreserve, unlock, and reset resources….

[org.jenkins-ci.plugins:implied-labels] Missing permission check in Jenkins Implied Labels Plugin allows reconfiguring the plugin

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202212/27/2022

Implied Labels Plugin 0.6 and earlier does not perform a permission check in an HTTP endpoint.
This allows attackers with Overall/Read permission to configure the plugin.
Implied Labels Plugin 0.7 requires Overall/Administer permission to configure the…

[org.jenkins-ci.plugins:liquibase-runner] XXE vulnerability in Jenkins Liquibase Runner Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/20/2022

Liquibase Runner Plugin 1.4.5 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows attackers able to provide Liquibase changesets evaluated by the plugin to have Jenkins parse a crafted XML file that u…

[org.jenkins-ci.plugins:liquibase-runner] Missing permission check in Jenkins Liquibase Runner Plugin allows enumerating credentials IDs

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202212/20/2022

Liquibase Runner Plugin 1.4.7 and earlier does not perform a permission check in an HTTP endpoint.
This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack …

Posts navigation

Previous Posts 1 … 9 10 11 12 13 … 38 Next Posts
TechMedia
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close