Skip to content

TechMedia

Header Image

[org.jvnet.hudson.plugins:storable-configs-plugin] Arbitrary file write vulnerability in Storable Configs Plugin

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202212/29/2022

Jenkins Storable Configs Plugin 1.0 and earlier does not restrict the user-specified file name, allowing attackers with Job/Configure permission to replace any other ‘.xml’ file on the Jenkins controller with a job config.xml file’s content.
References…

[org.jvnet.hudson.plugins:storable-configs-plugin] Arbitrary file read vulnerability in Storable Configs Plugin

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202212/29/2022

Jenkins Storable Configs Plugin 1.0 and earlier allows users with Job/Read permission to read arbitrary files on the Jenkins controller.
References

https://nvd.nist.gov/vuln/detail/CVE-2020-2277
https://www.jenkins.io/security/advisory/2020-09-16/#SEC…

[org.jvnet.hudson.plugins:selection-tasks-plugin] System command execution vulnerability in Selection tasks Jenkins Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/29/2022

Jenkins Selection tasks Plugin 1.0 and earlier executes a user-specified program on the Jenkins controller, allowing attackers with Job/Configure permission to execute an arbitrary system command on the Jenkins controller as the OS user that the Jenkin…

[io.jenkins.plugins:perfecto] OS command execution vulnerability in Perfecto Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/29/2022

Perfecto Plugin allows specifying Perfecto Connect Path and Perfecto Connect File Name in job configurations.
This command is executed on the Jenkins controller in Perfecto Plugin 1.17 and earlier, allowing attackers with Job/Configure permission to ru…

[io.jenkins.plugins:perfecto] Missing permission check in Perfecto Plugin

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202212/29/2022

Perfecto Plugin 1.17 and earlier does not perform a permission check in a method implementing a connection test.
This allows attackers with Overall/Read permission to connect to an attacker-specified HTTP URL using attacker-specified username and passw…

[org.jenkins-ci.plugins:custom-job-icon] Stored XSS vulnerability in Custom Job Icon Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/29/2022

Jenkins Custom Job Icon Plugin 0.2 and earlier does not escape the job descriptions in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
References

https://nvd.nist.gov/vul…

[org.jenkins-ci.plugins:covcomplplot] Stored XSS vulnerability in Coverage/Complexity Scatter Plot Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/29/2022

Jenkins Coverage/Complexity Scatter Plot Plugin 1.1.1 and earlier does not escape the method information in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide report files to the plugin’s p…

[org.jvnet.hudson.plugins:locked-files-report] Stored XSS vulnerability in Locked Files Report Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/29/2022

Jenkins Locked Files Report Plugin 1.6 and earlier does not escape locked files’ names in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
References

https://nvd.nist.gov/…

[org.jvnet.hudson.plugins:clearcase-release] Stored XSS vulnerability in ClearCase Release Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/29/2022

Jenkins ClearCase Release Plugin 0.3 and earlier does not escape the composite baseline in badge tooltip, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
References

https://nvd.nis…

[org.jenkins-ci.plugins:chosen-views-tabbar] Stored XSS vulnerability in chosen-views-tabbar Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/29/2022

Jenkins chosen-views-tabbar Plugin 1.2 and earlier does not escape view names in the dropdown to select views, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with the ability to configure views.
References

http…

Posts navigation

Previous Posts 1 … 81,080 81,081 81,082 81,083 81,084 … 81,135 Next Posts

Recent Posts

  • 大規模対戦ACT『Warlander』PS5/XSX版最新情報を公開―新コンテンツ追加やゲーム改善をリリースに向けて開発中
  • サウナブームが到来!!「ととのう」を提供するべく新サウナ施設や様々なサウナグッズが登場 (マイライフニュース)
  • 吉野家HDの24年2月期、営業益34%増 12年ぶり水準 (日本経済新聞)
  • 【フォト】大規模反攻、夏にずれ込む可能性 ウクライナ首相 (産経新聞)
  • 驚き!地球!グレートネイチャー「探検!未知なる海へ~北極海・ポリネシア~」[解][字]
An error has occurred, which probably means the feed is down. Try again later.
RSS Error: A feed could not be found at `https://nordot.app/-/feed/posts/rss?source_id=646357622673671265&curation_url=true`; the status code is `404` and content-type is `text/html; charset=UTF-8`
  • News
  • Twitter
  • Twilog
  • Scrapbox
  • Twitter log
  • Apple News
  • Mastodon log
  • coron news&archives
  • SNSNews
  • TechnoPlanet
  • iTech
  • ComputerJournal
  • Underground News
  • Last.fm
  • はてなブックマーク
  • Tumblr
  • ツイフィール
  • ウェブサイト利用規約
  • Google提供広告の広告設定
  • 他の広告のオプトアウト
  • Valuecommerce配信広告のオプトアウト
  • Zuck配信広告のオプトアウト
  • i-mobile配信広告のオプトアウト
  • Amazon.co.jpパーソナライズド広告の設定

What’s TechMedia

TechMediaはオープンRSS情報サイトです。世界中のウェブサイトから情報を収集し、検索のヒントになる情報を掲載しています。登録RSSの追加依頼はこちらから

TechMedia
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close