Skip to content

TechMedia

Header Image
Category

HIGH

385 Posts

Featured

Posted byWpmaster
[Microsoft.NetCore.App.Runtime.win-arm] .NET Remote Code Execution Vulnerability
Posted byWpmaster
[github.com/traefik/traefik/v2] Traefik HTTP header parsing could cause a denial of service
Posted byWpmaster
[github.com/answerdev/answer] Answer vulnerable to Exposure of Sensitive Information Through Metadata
Posted byWpmaster
[github.com/answerdev/answer] Answer vulnerable to Insertion of Sensitive Information Into Sent Data

[org.jenkins-ci.main:jenkins-core] Stored XSS vulnerability in Jenkins job build time trend

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/28/2022

Jenkins 2.244 and earlier, LTS 2.235.1 and earlier does not escape the agent name in the build time trend page, resulting in a stored cross-site scripting vulnerability.
Jenkins 2.245, LTS 2.235.2 escapes the agent name.
References

https://nvd.nist.go…

[org.jenkins-ci.main:jenkins-core] Stored XSS vulnerability in Jenkins upstream cause

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/28/2022

Jenkins 2.244 and earlier, LTS 2.235.1 and earlier does not escape the upstream job’s display name shown as part of a build cause, resulting in a stored cross-site scripting vulnerability.
Jenkins 2.245, LTS 2.235.2 escapes the job display name.
Refere…

[org.jenkins-ci.plugins:play-autotest-plugin] OS command injection vulnerability in Jenkins Play Framework Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/22/2022

A form validation endpoint in Play Framework Plugin executes the play command to validate a given input file.
Play Framework Plugin 1.0.2 and earlier lets users specify the path to the play command on the Jenkins controller. This results in an OS comma…

[org.jenkins-ci.plugins:selenium] Complete lack of CSRF protection in Jenkins Selenium Plugin can lead to OS command injection

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/21/2022

Selenium Plugin 3.141.59 and earlier has no CSRF protection for its HTTP endpoints.
This allows attackers to perform the following actions:

Restart the Selenium Grid hub.
Delete or replace the plugin configuration.
Start, stop, or restart Selenium con…

[io.jenkins.plugins:scm-filter-jervis] RCE vulnerability in SCM Filter Jervis Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/17/2022

SCM Filter Jervis Plugin 0.2.1 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types. This results in a remote code execution (RCE) vulnerability exploitable by users able to configure jobs with the filter, or c…

[com.parasoft:parasoft-findings] XXE vulnerability in Jenkins Parasoft Findings Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/17/2022

Parasoft Findings Plugin implements a static analysis parser for various Parasoft products and integrates with Warnings Plugin (10.4.1 and earlier) and Warnings NG Plugin (10.4.2 and newer).
Parasoft Findings Plugin 10.4.3 and earlier does not configur…

[io.jenkins.plugins:aws-sam] RCE vulnerability in Jenkins AWS SAM Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/17/2022

AWS SAM Plugin 1.2.2 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types. This results in a remote code execution (RCE) vulnerability exploitable by users able to configure a job or control the contents of a p…

[org.jenkins-ci.plugins:yaml-axis] RCE vulnerability in Jenkins Yaml Axis Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/17/2022

Yaml Axis Plugin 0.2.0 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types. This results in a remote code execution (RCE) vulnerability exploitable by users able to configure a multi-configuration (Matrix) job…

[io.jenkins.plugins:code-coverage-api] XXE vulnerability in Jenkins Code Coverage API Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/20/2022

Code Coverage API Plugin 1.1.4 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This allows a user able to control the input files for the “Publish Coverage Report” post-build step to have Jenkins parse a craf…

[org.jenkins-ci.plugins:rapiddeploy-jenkins] XXE vulnerability in Jenkins RapidDeploy Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 05/25/202212/22/2022

RapidDeploy Plugin 4.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows a user able to control the input files for the ‘RapidDeploy deployment package build’ build or post-build step to have Jenkin…

Posts navigation

Previous Posts 1 … 31 32 33 34 35 … 39 Next Posts
TechMedia
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close