Skip to content

TechMedia

Header Image

[com.moded.extendedchoiceparameter:dynamic_extended_choice_parameter] Password stored in plain text by Dynamic Extended Choice Parameter Plugin

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202201/14/2023

Jenkins Dynamic Extended Choice Parameter Plugin 1.0.1 and earlier stores a password unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system.
Reference…

[com.dubture.jenkins:digitalocean-plugin] Token stored in plain text by DigitalOcean Plugin

  • Posted inLOW
  • Posted byWpmaster
  • 05/25/202201/10/2023

Jenkins DigitalOcean Plugin 1.1 and earlier stores a token unencrypted in the global config.xml file on the Jenkins master where it can be viewed by users with access to the master file system.
References

https://nvd.nist.gov/vuln/detail/CVE-2020-2126…

[RPD:bmc-rpd] Credential stored in plain text by BMC Release Package and Deployment Plugin

  • Posted inLOW
  • Posted byWpmaster
  • 05/25/202201/10/2023

Jenkins BMC Release Package and Deployment Plugin 1.1 and earlier stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. As of publication of this a…

[com.parasoft:environment-manager] Password stored in plain text by Parasoft Environment Manager Plugin

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202201/06/2023

Jenkins Parasoft Environment Manager Plugin 2.14 and earlier stores a password unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system.
References

htt…

[com.catalogic.ecxjenkins:catalogic-ecx] Password stored in plain text by ECX Copy Data Management Plugin

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202201/06/2023

Jenkins ECX Copy Data Management Plugin 1.9 and earlier stores a password unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system.
References

https://…

[org.jenkins-ci.plugins:pipeline-githubnotify-step] CSRF vulnerability in Pipeline GitHub Notify Step Plugin allows capturing credentials

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202201/14/2023

A cross-site request forgery vulnerability in Jenkins Pipeline GitHub Notify Step Plugin 1.0.4 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing cred…

[org.jenkins-ci.plugins:pipeline-build-step] Users with Overall/Read access can enumerate credential IDs in Pipeline GitHub Notify Step Plugin

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/25/202201/14/2023

Pipeline GitHub Notify Step Plugin 1.0.4 and earlier provides a list of applicable credential IDs to allow users configuring the plugin to select the one to use.
This functionality does not correctly check permissions, allowing any user with Overall/Re…

[org.jenkins-ci.plugins:pipeline-githubnotify-step] Missing permission checks in Pipeline GitHub Notify Step Plugin allows capturing credentials

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202201/14/2023

A missing permission check in Jenkins Pipeline GitHub Notify Step Plugin 1.0.4 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, c…

[org.jenkins-ci.plugins:azure-ad] Client secret transmitted in plain text by Azure AD Plugin

  • Posted inLOW
  • Posted byWpmaster
  • 05/25/202201/14/2023

Azure AD Plugin stores a client secret in its global configuration.
While the credential is stored encrypted on disk, it is transmitted in plain text as part of the configuration form by Azure AD Plugin 1.1.2 and earlier. This can result in exposure of…

[org.jenkins-ci.plugins:nunit] XXE vulnerability in NUnit Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202201/14/2023

NUnit Plugin 0.25 and earlier does not configure the XML parser to prevent XML external entity (XXE) attacks.
This allows a user able to control the input files for its post-build step to have Jenkins parse a crafted file that uses external entities fo…

Posts navigation

Previous Posts 1 … 81,978 81,979 81,980 81,981 81,982 … 82,021 Next Posts

Recent Posts

  • 大規模対戦ACT『Warlander』PS5/XSX版最新情報を公開―新コンテンツ追加やゲーム改善をリリースに向けて開発中
  • サウナブームが到来!!「ととのう」を提供するべく新サウナ施設や様々なサウナグッズが登場 (マイライフニュース)
  • 吉野家HDの24年2月期、営業益34%増 12年ぶり水準 (日本経済新聞)
  • 【フォト】大規模反攻、夏にずれ込む可能性 ウクライナ首相 (産経新聞)
  • 驚き!地球!グレートネイチャー「探検!未知なる海へ~北極海・ポリネシア~」[解][字]
An error has occurred, which probably means the feed is down. Try again later.
RSS Error: A feed could not be found at `https://nordot.app/-/feed/posts/rss?source_id=646357622673671265&curation_url=true`; the status code is `404` and content-type is `text/html; charset=UTF-8`
  • News
  • Twitter
  • Twilog
  • Scrapbox
  • Twitter log
  • Apple News
  • Mastodon log
  • coron news&archives
  • SNSNews
  • TechnoPlanet
  • iTech
  • ComputerJournal
  • Underground News
  • Last.fm
  • はてなブックマーク
  • Tumblr
  • ツイフィール
  • ウェブサイト利用規約
  • Google提供広告の広告設定
  • 他の広告のオプトアウト
  • Valuecommerce配信広告のオプトアウト
  • Zuck配信広告のオプトアウト
  • i-mobile配信広告のオプトアウト
  • Amazon.co.jpパーソナライズド広告の設定

What’s TechMedia

TechMediaはオープンRSS情報サイトです。世界中のウェブサイトから情報を収集し、検索のヒントになる情報を掲載しています。登録RSSの追加依頼はこちらから

TechMedia
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close