Page 17 of 1626 results (0.008 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Jenkins SSH2 Easy Plugin 1.4 and earlier does not verify that permissions configured to be granted are enabled, potentially allowing users formerly granted (typically optional permissions, like Overall/Manage) to access functionality they're no longer entitled to. El complemento Jenkins SSH2 Easy 1.4 y versiones anteriores no verifican que los permisos configurados para ser otorgados estén habilitados, lo que potencialmente permite a los usuarios que anteriormente se les otorgaban (generalmente permisos opcionales, como Overall/Manage) acceder a la funcionalidad a la que ya no tienen derecho. • http://www.openwall.com/lists/oss-security/2023/09/06/9 https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3064 • CWE-281: Improper Preservation of Permissions •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

A cross-site request forgery (CSRF) vulnerability in Jenkins Ivy Plugin 2.5 and earlier allows attackers to delete disabled modules. Una vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Jenkins Ivy 2.5 y versiones anteriores permite a los atacantes eliminar módulos deshabilitados. • http://www.openwall.com/lists/oss-security/2023/09/06/9 https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3093 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Jenkins Bitbucket Push and Pull Request Plugin 2.4.0 through 2.8.3 (both inclusive) trusts values provided in the webhook payload, including certain URLs, and uses configured Bitbucket credentials to connect to those URLs, allowing attackers to capture Bitbucket credentials stored in Jenkins by sending a crafted webhook payload. El complemento Jenkins Bitbucket Push and Pull Request versiones 2.4.0 a 2.8.3 (ambas incluidas) confía en los valores proporcionados en el payload del webhook, incluidas ciertas URL, y utiliza credenciales de Bitbucket configuradas para conectarse a esas URL, lo que permite a los atacantes capturar las credenciales de Bitbucket almacenadas en Jenkins enviando un payload de webhook manipulado. • http://www.openwall.com/lists/oss-security/2023/09/06/9 https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3165 • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Jenkins Google Login Plugin 1.7 and earlier uses a non-constant time comparison function when checking whether the provided and expected token are equal, potentially allowing attackers to use statistical methods to obtain a valid token. El complemento Jenkins Google Login 1.7 y versiones anteriores utilizan una función de comparación de tiempo no constante al verificar si el token proporcionado y esperado son iguales, lo que potencialmente permite a los atacantes utilizar métodos estadísticos para obtener un token válido. • http://www.openwall.com/lists/oss-security/2023/09/06/9 https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3228 • CWE-697: Incorrect Comparison •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Jenkins Azure AD Plugin 396.v86ce29279947 and earlier, except 378.380.v545b_1154b_3fb_, uses a non-constant time comparison function when checking whether the provided and expected CSRF protection nonce are equal, potentially allowing attackers to use statistical methods to obtain a valid nonce. El complemento Jenkins Azure AD 396.v86ce29279947 y versiones anteriores, excepto 378.380.v545b_1154b_3fb_, usa una función de comparación de tiempo no constante al comprobar si el nonce de protección CSRF proporcionado y esperado es igual, lo que podría permitir a los atacantes usar métodos estadísticos para obtener un nonce válido. • http://www.openwall.com/lists/oss-security/2023/09/06/9 https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3227 • CWE-697: Incorrect Comparison •