Skip to content

TechMedia

Header Image

[org.jenkins-ci.plugins:logstash] Credentials transmitted in plain text by Jenkins Logstash Plugin

  • Posted inLOW
  • Posted byWpmaster
  • 05/25/202201/14/2023

Logstash Plugin stores credentials in its global configuration file jenkins.plugins.logstash.LogstashConfiguration.xml on the Jenkins controller as part of its configuration.
While the credentials are stored encrypted on disk, they are transmitted in p…

[org.jenkins-ci.plugins:rundeck] XXE vulnerability in Rundeck Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202201/14/2023

Rundeck Plugin 3.6.6 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows a user with Overall/Read access to have Jenkins parse a crafted HTTP request with XML data that uses external entities for extr…

[org.jenkins-ci.plugins:zephyr-enterprise-test-management] Credentials stored in plain text by Zephyr Enterprise Test Management Plugin

  • Posted inLOW
  • Posted byWpmaster
  • 05/25/202201/14/2023

Zephyr Enterprise Test Management Plugin 1.9.1 and earlier stores its Zephyr password in plain text in the global configuration file com.thed.zephyr.jenkins.reporter.ZeeReporter.xml. This password can be viewed by users with access to the Jenkins contr…

[fr.edf.jenkins.plugins:mac] CSRF vulnerability in Mac Plugin

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202201/14/2023

A cross-site request forgery vulnerability in Jenkins Mac Plugin 1.1.0 and earlier allows attackers to connect to an attacker-specified SSH server using attacker-specified credentials.
References

https://nvd.nist.gov/vuln/detail/CVE-2020-2147
https://…

[org.jenkins-ci.plugins:repository-connector] Credentials transmitted in plain text by Repository Connector Plugin

  • Posted inLOW
  • Posted byWpmaster
  • 05/25/202201/14/2023

Repository Connector Plugin stores credentials in its global configuration file org.jvnet.hudson.plugins.repositoryconnector.RepositoryConfiguration.xml on the Jenkins controller as part of its configuration.
While the credentials are stored encrypted …

[org.jenkins-ci.plugins:quality-gates] Jenkins Quality Gates Plugin transmits credentials in plain text during configuration

  • Posted inLOW
  • Posted byWpmaster
  • 05/25/202201/07/2023

Quality Gates Plugin stores credentials in its global configuration file quality.gates.jenkins.plugin.GlobalConfig.xml on the Jenkins controller as part of its configuration. While the credentials are stored encrypted on disk, they are transmitted in p…

[org.jenkins-ci.plugins:sonar-quality-gates] Jenkins Sonar Quality Gates Plugin transmits credentials in plain text during configuration

  • Posted inLOW
  • Posted byWpmaster
  • 05/25/202201/07/2023

Sonar Quality Gates Plugin stores credentials in its global configuration file org.quality.gates.jenkins.plugin.GlobalConfig.xml on the Jenkins controller as part of its configuration. While the credentials are stored encrypted on disk, they are transm…

[org.jenkins-ci.plugins:cobertura] XXE vulnerability in Jenkins Cobertura Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202201/06/2023

Cobertura Plugin 1.15 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows a user able to control the input files for the ‘Publish Cobertura Coverage Report’ post-build step to have Jenkins parse a cra…

[org.jenkins-ci.plugins:cobertura] Arbitrary file write vulnerability in Jenkins Cobertura Plugin

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202201/06/2023

An arbitrary file write vulnerability in Jenkins Cobertura Plugin 1.15 and earlier allows attackers able to control the coverage report file contents to overwrite any file on the Jenkins master file system. Cobertura Plugin 1.16 sanitizes the file path…

[org.jenkins-ci.plugins:audit-trail] XSS vulnerability in Jenkins Audit Trail Plugin

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202201/06/2023

Jenkins Audit Trail Plugin 3.2 and earlier does not escape the error message for the URL Patterns field form validation, resulting in a reflected cross-site scripting vulnerability. Audit Trail Plugin 3.3 escapes the affected part of the error message….

Posts navigation

Previous Posts 1 … 81,976 81,977 81,978 81,979 81,980 … 82,021 Next Posts

Recent Posts

  • 大規模対戦ACT『Warlander』PS5/XSX版最新情報を公開―新コンテンツ追加やゲーム改善をリリースに向けて開発中
  • サウナブームが到来!!「ととのう」を提供するべく新サウナ施設や様々なサウナグッズが登場 (マイライフニュース)
  • 吉野家HDの24年2月期、営業益34%増 12年ぶり水準 (日本経済新聞)
  • 【フォト】大規模反攻、夏にずれ込む可能性 ウクライナ首相 (産経新聞)
  • 驚き!地球!グレートネイチャー「探検!未知なる海へ~北極海・ポリネシア~」[解][字]
An error has occurred, which probably means the feed is down. Try again later.
RSS Error: A feed could not be found at `https://nordot.app/-/feed/posts/rss?source_id=646357622673671265&curation_url=true`; the status code is `404` and content-type is `text/html; charset=UTF-8`
  • News
  • Twitter
  • Twilog
  • Scrapbox
  • Twitter log
  • Apple News
  • Mastodon log
  • coron news&archives
  • SNSNews
  • TechnoPlanet
  • iTech
  • ComputerJournal
  • Underground News
  • Last.fm
  • はてなブックマーク
  • Tumblr
  • ツイフィール
  • ウェブサイト利用規約
  • Google提供広告の広告設定
  • 他の広告のオプトアウト
  • Valuecommerce配信広告のオプトアウト
  • Zuck配信広告のオプトアウト
  • i-mobile配信広告のオプトアウト
  • Amazon.co.jpパーソナライズド広告の設定

What’s TechMedia

TechMediaはオープンRSS情報サイトです。世界中のウェブサイトから情報を収集し、検索のヒントになる情報を掲載しています。登録RSSの追加依頼はこちらから

TechMedia
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close