Skip to content

TechMedia

Header Image

[io.jenkins.plugins:code-coverage-api] XXE vulnerability in Jenkins Code Coverage API Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/20/2022

Code Coverage API Plugin 1.1.4 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This allows a user able to control the input files for the “Publish Coverage Report” post-build step to have Jenkins parse a craf…

[org.jenkins-ci.plugins:azure-acs] RCE vulnerability in Jenkins Azure Container Service Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/22/2022

Azure Container Service Plugin 1.0.1 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types. This results in a remote code execution (RCE) vulnerability exploitable by users able to provide YAML input files to Az…

[org.jenkins-ci.plugins:queue-cleanup] Reflected XSS vulnerability in Jenkins Queue cleanup Plugin

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202212/22/2022

A form validation HTTP endpoint in Queue cleanup Plugin 1.3 and earlier does not escape a query parameter displayed in an error message. This results in a reflected cross-site scripting vulnerability (XSS).
Queue cleanup Plugin 1.4 correctly escapes th…

[org.jenkins-ci.plugins:rapiddeploy-jenkins] XXE vulnerability in Jenkins RapidDeploy Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/22/2022

RapidDeploy Plugin 4.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows a user able to control the input files for the ‘RapidDeploy deployment package build’ build or post-build step to have Jenkin…

[de.taimos:pipeline-aws] RCE vulnerability in Jenkins Pipeline: AWS Steps Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/31/2022

Pipeline: AWS Steps Plugin 1.40 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types. This results in a remote code execution (RCE) vulnerability exploitable by users able to provide YAML input files to Pipelin…

[com.openshift.jenkins:openshift-pipeline] RCE vulnerability in Jenkins OpenShift Pipeline Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/29/2022

OpenShift Pipeline Plugin 1.0.56 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types. This results in a remote code execution (RCE) vulnerability exploitable by users able to provide YAML input files to OpenSh…

[org.jenkins-ci.plugins:rapiddeploy-jenkins] Stored XSS vulnerability in Jenkins RapidDeploy Plugin

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202212/22/2022

RapidDeploy Plugin 4.2 and earlier does not escape package names in its displayed table of packages obtained from a remote server. This results in a stored cross-site scripting (XSS) vulnerability exploitable by users able to configure jobs.
RapidDeplo…

[org.jenkins-ci.plugins:artifactory] Passwords stored in plain text by Jenkins Artifactory Plugin

  • Posted inLOW
  • Posted byWpmaster
  • 05/25/202212/22/2022

Artifactory Plugin 3.5.0 and earlier stores its Artifactory server password in plain text in the global configuration file org.jfrog.hudson.ArtifactoryBuilder.xml. This password can be viewed by users with access to the Jenkins controller file system.
…

[org.jenkins-ci.plugins:artifactory] Passwords transmitted in plain text by Jenkins Artifactory Plugin

  • Posted inLOW
  • Posted byWpmaster
  • 05/25/202212/22/2022

Jenkins Artifactory Plugin 3.6.0 and earlier stores Artifactory server passwords in its global configuration file org.jfrog.hudson.ArtifactoryBuilder.xml on the Jenkins controller as part of its configuration.
While the password is stored encrypted on …

[io.jenkins.plugins:cryptomove] OS command injection in CryptoMove Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202201/06/2023

CryptoMove Plugin 0.1.33 and earlier allows the configuration of an OS command to execute as part of its build step configuration. This command will be executed on the Jenkins controller as the OS user account running Jenkins, allowing user with Job/Co…

Posts navigation

Previous Posts 1 … 81,974 81,975 81,976 81,977 81,978 … 82,021 Next Posts

Recent Posts

  • 大規模対戦ACT『Warlander』PS5/XSX版最新情報を公開―新コンテンツ追加やゲーム改善をリリースに向けて開発中
  • サウナブームが到来!!「ととのう」を提供するべく新サウナ施設や様々なサウナグッズが登場 (マイライフニュース)
  • 吉野家HDの24年2月期、営業益34%増 12年ぶり水準 (日本経済新聞)
  • 【フォト】大規模反攻、夏にずれ込む可能性 ウクライナ首相 (産経新聞)
  • 驚き!地球!グレートネイチャー「探検!未知なる海へ~北極海・ポリネシア~」[解][字]
An error has occurred, which probably means the feed is down. Try again later.
RSS Error: A feed could not be found at `https://nordot.app/-/feed/posts/rss?source_id=646357622673671265&curation_url=true`; the status code is `404` and content-type is `text/html; charset=UTF-8`
  • News
  • Twitter
  • Twilog
  • Scrapbox
  • Twitter log
  • Apple News
  • Mastodon log
  • coron news&archives
  • SNSNews
  • TechnoPlanet
  • iTech
  • ComputerJournal
  • Underground News
  • Last.fm
  • はてなブックマーク
  • Tumblr
  • ツイフィール
  • ウェブサイト利用規約
  • Google提供広告の広告設定
  • 他の広告のオプトアウト
  • Valuecommerce配信広告のオプトアウト
  • Zuck配信広告のオプトアウト
  • i-mobile配信広告のオプトアウト
  • Amazon.co.jpパーソナライズド広告の設定

What’s TechMedia

TechMediaはオープンRSS情報サイトです。世界中のウェブサイトから情報を収集し、検索のヒントになる情報を掲載しています。登録RSSの追加依頼はこちらから

TechMedia
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close