Skip to content

TechMedia

Header Image
Category

LOW

79 Posts

Featured

Posted byWpmaster
[safeurl-python] Withdrawn: safeurl-python contains Server-Side Request Forgery
Posted byWpmaster
[org.jenkins-ci.plugins:github-pr-coverage-status] Plaintext storage of Access Token in Jenkins GitHub Pull Request Coverage Status Plugin
Posted byWpmaster
[shopware/platform] Shopware’s log module vulnerable to Improper Output Neutralization
Posted byWpmaster
[rack] Denial of Service Vulnerability in Rack Content-Disposition parsing

[ru.yandex.jenkins.plugins.debuilder:debian-package-builder] Credentials stored in plain text by debian-package-builder Plugin

  • Posted inLOW
  • Posted byWpmaster
  • 05/25/202201/14/2023

debian-package-builder Plugin 1.6.11 and earlier stores a GPG passphrase unencrypted in its global configuration file ru.yandex.jenkins.plugins.debuilder.DebianPackageBuilder.xml on the Jenkins controller. This credential can be viewed by users with ac…

[RPD:bmc-rpd] Credential stored in plain text by BMC Release Package and Deployment Plugin

  • Posted inLOW
  • Posted byWpmaster
  • 05/25/202201/10/2023

Jenkins BMC Release Package and Deployment Plugin 1.1 and earlier stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. As of publication of this a…

[com.dubture.jenkins:digitalocean-plugin] Token stored in plain text by DigitalOcean Plugin

  • Posted inLOW
  • Posted byWpmaster
  • 05/25/202201/10/2023

Jenkins DigitalOcean Plugin 1.1 and earlier stores a token unencrypted in the global config.xml file on the Jenkins master where it can be viewed by users with access to the master file system.
References

https://nvd.nist.gov/vuln/detail/CVE-2020-2126…

[org.jenkins-ci.plugins:azure-ad] Client secret transmitted in plain text by Azure AD Plugin

  • Posted inLOW
  • Posted byWpmaster
  • 05/25/202201/14/2023

Azure AD Plugin stores a client secret in its global configuration.
While the credential is stored encrypted on disk, it is transmitted in plain text as part of the configuration form by Azure AD Plugin 1.1.2 and earlier. This can result in exposure of…

[org.jenkins-ci.plugins:s3] Jenkins S3 Publisher Plugin transmits credentials in plain text during configuration

  • Posted inLOW
  • Posted byWpmaster
  • 05/25/202201/07/2023

S3 Publisher Plugin stores a secret key in its global configuration. While the credential is stored encrypted on disk, it is transmitted in plain text as part of the configuration form by S3 publisher Plugin 0.11.4 and earlier. This can result in expos…

[org.jenkins-ci.main:jenkins-core] Jenkins REST APIs vulnerable to clickjacking

  • Posted inLOW
  • Posted byWpmaster
  • 05/25/202212/20/2022

Jenkins 2.218 and earlier, LTS 2.204.1 and earlier does not serve the X-Frame-Options: deny HTTP header on REST API responses to protect against clickjacking attacks. An attacker could exploit this by routing the victim through a specially crafted web …

[org.jenkins-ci.plugins:ec2] CSRF vulnerability in Jenkins Amazon EC2 Plugin

  • Posted inLOW
  • Posted byWpmaster
  • 05/25/202212/30/2022

Amazon EC2 Plugin 1.47 and earlier does not perform permission checks in methods performing form validation. This allows users with Overall/Read access to Jenkins to connect to an attacker-specified URL within the AWS region using attacker-specified cr…

[katello] Katello cleartext password storage issue

  • Posted inLOW
  • Posted byWpmaster
  • 05/25/202210/20/2022

A cleartext password storage issue was discovered in Katello, versions 3.x.x.x before katello 3.12.2. Registry credentials used during container image discovery were inadvertently logged without being masked. This flaw could expose the registry credent…

[com.mtvi.plateng.hudson:ldapemail] Jenkins LDAP Email Plugin shows plain text password in configuration form

  • Posted inLOW
  • Posted byWpmaster
  • 05/25/202201/28/2023

Jenkins LDAP Email Plugin transmits configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.
References

https://nvd.nist.gov/vuln/detail/CVE-2019-10434
https://jenkins.io/security/…

[org.jenkins-ci.plugins:reverse-proxy-auth-plugin] Jenkins Reverse Proxy Auth Plugin allows attackers with local file system access to obtain a list of authorities for logged in users

  • Posted inLOW
  • Posted byWpmaster
  • 05/14/202212/20/2022

An exposure of sensitive information vulnerability exists in Jenkins Reverse Proxy Auth Plugin 1.5 and older in ReverseProxySecurityRealm#authContext that allows attackers with local file system access to obtain a list of authorities for logged in user…

Posts navigation

Previous Posts 1 … 5 6 7 8 Next Posts
TechMedia
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close