Skip to content

TechMedia

Header Image
Archive

Month: May 2022

376 Posts

Featured

Posted byWpmaster
ウクライナ戦争に見るワイパー攻撃の実態とデジタル情報操作
Posted byWpmaster
「エースコンバット」と「トップガン マーヴェリック」が夢のコラボ!マーヴェリックスキンの「F-14A Tomcat」や「F/A-18E Super Hornet」が登場!
Posted byWpmaster
高橋幸宏、ソロ活動50周年記念!『T.E.N.T Years Vinyl Box』収録ライブ音源の詳細発表!
Posted byWpmaster
[camaleon_cms] Camaleon CMS Stored Cross-site Scripting vulnerability

[org.jenkins-ci.plugins:yaml-axis] RCE vulnerability in Jenkins Yaml Axis Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/17/2022

Yaml Axis Plugin 0.2.0 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types. This results in a remote code execution (RCE) vulnerability exploitable by users able to configure a multi-configuration (Matrix) job…

[br.com.ingenieux.jenkins.plugins:awseb-deployment-plugin] Reflected XSS vulnerability in Jenkins AWSEB Deployment Plugin

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202212/21/2022

AWSEB Deployment Plugin 0.3.19 and earlier does not escape various values printed as part of form validation output.
This results in a reflected cross-site scripting (XSS) vulnerability.
AWSEB Deployment Plugin 0.3.20 escapes the values printed as part…

[org.jenkins-ci.plugins:gatling] XSS vulnerability in Jenkins Gatling Plugin

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202212/21/2022

Gatling Plugin 1.2.7 and earlier serves Gatling reports in a manner that bypasses the Content-Security-Policy protection introduced in Jenkins 1.641 and 1.625.3. This results in a cross-site scripting (XSS) vulnerability exploitable by users able to ch…

[it.infuse.jenkins:usemango-runner] XSS vulnerability in Jenkins useMango Runner Plugin

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202212/21/2022

Multiple form validation endpoints in useMango Runner Plugin 1.4 and earlier do not escape values received from the useMango service.
This results in a cross-site scripting (XSS) vulnerability exploitable by users able to control the values returned fr…

[io.jenkins.plugins:code-coverage-api] XXE vulnerability in Jenkins Code Coverage API Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/20/2022

Code Coverage API Plugin 1.1.4 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This allows a user able to control the input files for the “Publish Coverage Report” post-build step to have Jenkins parse a craf…

[org.jenkins-ci.plugins:azure-acs] RCE vulnerability in Jenkins Azure Container Service Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/22/2022

Azure Container Service Plugin 1.0.1 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types. This results in a remote code execution (RCE) vulnerability exploitable by users able to provide YAML input files to Az…

[org.jenkins-ci.plugins:queue-cleanup] Reflected XSS vulnerability in Jenkins Queue cleanup Plugin

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202212/22/2022

A form validation HTTP endpoint in Queue cleanup Plugin 1.3 and earlier does not escape a query parameter displayed in an error message. This results in a reflected cross-site scripting vulnerability (XSS).
Queue cleanup Plugin 1.4 correctly escapes th…

[org.jenkins-ci.plugins:rapiddeploy-jenkins] XXE vulnerability in Jenkins RapidDeploy Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/22/2022

RapidDeploy Plugin 4.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows a user able to control the input files for the ‘RapidDeploy deployment package build’ build or post-build step to have Jenkin…

[de.taimos:pipeline-aws] RCE vulnerability in Jenkins Pipeline: AWS Steps Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/31/2022

Pipeline: AWS Steps Plugin 1.40 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types. This results in a remote code execution (RCE) vulnerability exploitable by users able to provide YAML input files to Pipelin…

[com.openshift.jenkins:openshift-pipeline] RCE vulnerability in Jenkins OpenShift Pipeline Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/29/2022

OpenShift Pipeline Plugin 1.0.56 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types. This results in a remote code execution (RCE) vulnerability exploitable by users able to provide YAML input files to OpenSh…

Posts navigation

Previous Posts 1 … 18 19 20 21 22 … 38 Next Posts
TechMedia
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close