Skip to content

TechMedia

Header Image
Author

wpmaster

811184 Posts

Featured

Posted byWpmaster
大規模対戦ACT『Warlander』PS5/XSX版最新情報を公開―新コンテンツ追加やゲーム改善をリリースに向けて開発中
Posted byWpmaster
サウナブームが到来!!「ととのう」を提供するべく新サウナ施設や様々なサウナグッズが登場 (マイライフニュース)
Posted byWpmaster
吉野家HDの24年2月期、営業益34%増 12年ぶり水準 (日本経済新聞)
Posted byWpmaster
【フォト】大規模反攻、夏にずれ込む可能性 ウクライナ首相 (産経新聞)

[org.jenkins-ci.main:jenkins-core] Improper handling of equivalent directory names on Windows in Jenkins

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202212/16/2022

Jenkins stores jobs and other entities on disk using their name shown on the UI as file and folder names.
On Windows, when specifying a file or folder with a trailing dot character (example.), the file or folder will be treated as if that character was…

[org.jenkins-ci.main:jenkins-core] Path traversal vulnerability on Windows in Jenkins

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202212/16/2022

The file browser for workspaces, archived artifacts, and userContent/ in Jenkins 2.314 and earlier, LTS 2.303.1 and earlier may interpret some paths to files as absolute on Windows.
This results in a path traversal vulnerability allowing attackers with…

[org.jenkins-ci.plugins:git] Stored XSS vulnerability in Jenkins Git Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/16/2022

Git Plugin 4.8.2 and earlier does not escape the Git SHA-1 checksum parameters provided to commit notifications when displaying them in a build cause.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to su…

[org.jenkins-ci.plugins:nomad] Password stored in plain text by Jenkins Nomad Plugin

  • Posted inLOW
  • Posted byWpmaster
  • 05/25/202212/17/2022

Nomad Plugin 0.7.4 and earlier stores the passwords to authenticate against the Docker registry unencrypted in the global config.xml file on the Jenkins controller as part of its worker templates configuration.
These passwords can be viewed by users wi…

[smashing] Smashing Cross-site Scripting vulnerability

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202201/27/2023

Smashing 1.3.4 is vulnerable to Cross Site Scripting (XSS). A URL for a widget can be crafted and used to execute JavaScript on the victim’s computer. The JavaScript code can then steal data available in the session/cookies depending on the user enviro…

[org.jenkins-ci.main:jenkins-core] Session fixation vulnerability in Jenkins

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/24/2022

Jenkins 2.299 and earlier, LTS 2.289.1 and earlier does not invalidate the existing session on login. This allows attackers to use social engineering techniques to gain administrator access to Jenkins.
This vulnerability was introduced in Jenkins 2.266…

[org.jenkins-ci.plugins:requests] CSRF vulnerabilities in Jenkins requests-plugin Plugin

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202212/17/2022

requests-plugin Plugin 2.2.12 and earlier does not require POST requests to request and apply changes, resulting in cross-site request forgery (CSRF) vulnerabilities.
These vulnerabilities allow attackers to create requests and/or have administrators a…

[org.jenkins-ci.main:jenkins-core] Improper permission checks allow canceling queue items and aborting builds in Jenkins

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202212/17/2022

Jenkins 2.299 and earlier, LTS 2.289.1 and earlier allows users to cancel queue items and abort builds of jobs for which they have Item/Cancel permission even when they do not have Item/Read permission.
Jenkins 2.300, LTS 2.289.2 requires that users ha…

[org.jenkins-ci.plugins:requests] Missing permission check in Jenkins requests-plugin Plugin allows sending emails

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202212/17/2022

requests-plugin Plugin 2.2.7 and earlier does not perform a permission check in an HTTP endpoint.
This allows attackers with Overall/Read permission to send test emails to an attacker-specified email address.
requests-plugin Plugin 2.2.8 requires Overa…

[org.jenkins-ci.plugins:cas-plugin] Open redirect vulnerability in Jenkins CAS Plugin

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202212/17/2022

CAS Plugin 1.6.0 and earlier improperly determines that a redirect URL after login is legitimately pointing to Jenkins.
This allows attackers to perform phishing attacks by having users go to a Jenkins URL that will forward them to a different site aft…

Posts navigation

Previous Posts 1 … 81,055 81,056 81,057 81,058 81,059 … 81,119 Next Posts
TechMedia
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close