CVE-2022-29045
https://notcve.org/view.php?id=CVE-2022-29045
Jenkins promoted builds Plugin 873.v6149db_d64130 and earlier, except 3.10.1, does not escape the name and description of Promoted Build parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Jenkins promoted builds Plugin versiones 873.v6149db_d64130 y anteriores, excepto 3.10.1, no escapa del nombre y la descripción de los parámetros de Promoted Build en las visualizaciones que muestran parámetros, resultando en una vulnerabilidad de tipo cross-site scripting (XSS) almacenado explotable por atacantes con permiso Item/Configure • https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2022-29049
https://notcve.org/view.php?id=CVE-2022-29049
Jenkins promoted builds Plugin 873.v6149db_d64130 and earlier, except 3.10.1, does not validate the names of promotions defined in Job DSL, allowing attackers with Job/Configure permission to create a promotion with an unsafe name. Jenkins promoted builds Plugin versiones 873.v6149db_d64130 y anteriores, excepto 3.10.1, no comprueba los nombres de las promociones definidas en Job DSL, lo que permite a atacantes con permiso de Job/Configure crear una promoción con un nombre no seguro • https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2655 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2022-28160
https://notcve.org/view.php?id=CVE-2022-28160
Jenkins Tests Selector Plugin 1.3.3 and earlier allows users with Item/Configure permission to read arbitrary files on the Jenkins controller. Jenkins Tests Selector Plugin versiones 1.3.3 y anteriores, permiten a usuarios con permiso Item/Configure leer archivos arbitrarios en el controlador Jenkins • http://www.openwall.com/lists/oss-security/2022/03/29/1 https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2338 • CWE-668: Exposure of Resource to Wrong Sphere •
CVE-2022-28159
https://notcve.org/view.php?id=CVE-2022-28159
Jenkins Tests Selector Plugin 1.3.3 and earlier does not escape the Properties File Path option for Choosing Tests parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Jenkins Tests Selector Plugin versiones 1.3.3 y anteriores, no escapa a la opción Properties File Path para elegir los parámetros de Tests, lo que resulta en una vulnerabilidad de tipo Cross-site scripting (XSS) almacenada explotable por atacantes con permiso Item/Configure • http://www.openwall.com/lists/oss-security/2022/03/29/1 https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2262 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2022-28158
https://notcve.org/view.php?id=CVE-2022-28158
A missing permission check in Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Una falta de comprobación de permisos en Jenkins Pipeline: Phoenix AutoTest Plugin versiones 1.3 y anteriores, permite a atacantes con permiso Overall/Read enumerar los ID de las credenciales almacenadas en Jenkins • http://www.openwall.com/lists/oss-security/2022/03/29/1 https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2685 • CWE-862: Missing Authorization •