Page 2 of 10 results (0.014 seconds)

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

A cross-site scripting vulnerability in Jenkins Warnings NG Plugin 5.0.0 and earlier allowed attacker with Job/Configure permission to inject arbitrary JavaScript in build overview pages. Una vulnerabilidad de tipo cross-site scripting en el Plugin Warnings NG de Jenkins versión 5.0.0 y anteriores, permitía al atacante con permiso de Trabajo y de Configuración inyectar JavaScript arbitrario en páginas de resumen de compilación. • http://www.openwall.com/lists/oss-security/2019/05/31/2 http://www.securityfocus.com/bid/108540 https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1373 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

A cross-site request forgery vulnerability exists in Jenkins Warnings Plugin 5.0.0 and earlier in src/main/java/hudson/plugins/warnings/GroovyParser.java that allows attackers to execute arbitrary code via a form validation HTTP endpoint. Existe una vulnerabilidad Cross-Site Request Forgery (CSRF) en Jenkins Warnings Plugin, en versiones 5.0.0 y anteriores, en src/main/java/hudson/plugins/warnings/GroovyParser.java, que permite que los atacantes ejecuten código arbitrario mediante un endpoint HTTP de validación de formularios. • https://jenkins.io/security/advisory/2019-01-28/#SECURITY-1295%20%281%29 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

A cross-site scripting vulnerability exists in Jenkins Warnings Next Generation Plugin 1.0.1 and earlier in src/main/java/io/jenkins/plugins/analysis/core/model/DetailsTableModel.java, src/main/java/io/jenkins/plugins/analysis/core/model/SourceDetail.java, src/main/java/io/jenkins/plugins/analysis/core/model/SourcePrinter.java, src/main/java/io/jenkins/plugins/analysis/core/util/Sanitizer.java, src/main/java/io/jenkins/plugins/analysis/warnings/DuplicateCodeScanner.java that allows attackers with the ability to control warnings parser input to have Jenkins render arbitrary HTML. Existe una vulnerabilidad Cross-Site Scripting (XSS) en Jenkins Warnings Next Generation Plugin, en versiones 1.0.1 y anteriores, en src/main/java/io/jenkins/plugins/analysis/core/model/DetailsTableModel.java, src/main/java/io/jenkins/plugins/analysis/core/model/SourceDetail.java, src/main/java/io/jenkins/plugins/analysis/core/model/SourcePrinter.java, src/main/java/io/jenkins/plugins/analysis/core/util/Sanitizer.java y src/main/java/io/jenkins/plugins/analysis/warnings/DuplicateCodeScanner.java, que permite que los atacantes con la capacidad de controlar las entradas del analizador de advertencias hagan que Jenkins renderice HTML arbitrario. • https://jenkins.io/security/advisory/2019-01-28/#SECURITY-1271 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

A cross-site request forgery vulnerability exists in Jenkins Warnings Next Generation Plugin 2.1.1 and earlier in src/main/java/io/jenkins/plugins/analysis/warnings/groovy/GroovyParser.java that allows attackers to execute arbitrary code via a form validation HTTP endpoint. Existe una vulnerabilidad Cross-Site Request Forgery (CSRF) en Jenkins Warnings Next Generation Plugin, en versiones 2.1.1 y anteriores, en src/main/java/io/jenkins/plugins/analysis/warnings/groovy/GroovyParser.java, que permite que los atacantes ejecuten código arbitrario mediante un endpoint HTTP de validación de formularios. • https://jenkins.io/security/advisory/2019-01-28/#SECURITY-1295%20%282%29 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Jenkins Warnings Plugin 4.64 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks. Jenkins Warnings Plugin en versiones 4.64 y anteriores procesa entidades XML externas en archivos que analiza como parte del proceso de build. Esto permite que atacantes con permisos de usuario en Jenkins extraigan secretos del master de Jenkins, realicen Server-Side Request Forgery o ataques de denegación de servicio (DoS). • https://jenkins.io/security/advisory/2018-01-22 • CWE-611: Improper Restriction of XML External Entity Reference •