CVE-2023-41945
https://notcve.org/view.php?id=CVE-2023-41945
Jenkins Assembla Auth Plugin 1.14 and earlier does not verify that the permissions it grants are enabled, resulting in users with EDIT permissions to be granted Overall/Manage and Overall/SystemRead permissions, even if those permissions are disabled and should not be granted. El complemento Jenkins Assembla Auth 1.14 y versiones anteriores no verifican que los permisos que concede estén habilitados, lo que hace que a los usuarios con permisos EDIT se les otorguen permisos Overall/Manage y Overall/SystemRead, incluso si esos permisos están deshabilitados y no deben concederse. • http://www.openwall.com/lists/oss-security/2023/09/06/9 https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3065 • CWE-862: Missing Authorization •
CVE-2023-37961
https://notcve.org/view.php?id=CVE-2023-37961
A cross-site request forgery (CSRF) vulnerability in Jenkins Assembla Auth Plugin 1.14 and earlier allows attackers to trick users into logging in to the attacker's account. • http://www.openwall.com/lists/oss-security/2023/07/12/2 https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-2988 • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2023-30521
https://notcve.org/view.php?id=CVE-2023-30521
A missing permission check in Jenkins Assembla merge request builder Plugin 1.1.13 and earlier allows unauthenticated attackers to trigger builds of jobs corresponding to the attacker-specified repository. • http://www.openwall.com/lists/oss-security/2023/04/13/3 https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2872 • CWE-862: Missing Authorization •
CVE-2019-10420
https://notcve.org/view.php?id=CVE-2019-10420
Jenkins Assembla Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. Jenkins Assembla Plugin almacena las credenciales sin cifrar en su archivo de configuración global en el maestro de Jenkins, donde pueden ser visualizados por los usuarios con acceso al sistema de archivos maestro. • http://www.openwall.com/lists/oss-security/2019/09/25/3 https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1543 • CWE-522: Insufficiently Protected Credentials •
CVE-2019-10280
https://notcve.org/view.php?id=CVE-2019-10280
Jenkins Assembla Auth Plugin stores credentials unencrypted in the global config.xml configuration file on the Jenkins master where they can be viewed by users with access to the master file system. El plugin Assembla Auth de Jenkins almacena credenciales sin cifrar en su archivo de configuración global config.xml en el servidor maestro de Jenkins donde dichas credenciales pueden ser visualizadas por los usuarios con acceso al sistema de archivos maestro. • http://www.openwall.com/lists/oss-security/2019/04/12/2 http://www.securityfocus.com/bid/107790 https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1093 • CWE-522: Insufficiently Protected Credentials •