CVE-2023-32978
https://notcve.org/view.php?id=CVE-2023-32978
A cross-site request forgery (CSRF) vulnerability in Jenkins LDAP Plugin allows attackers to connect to an attacker-specified LDAP server using attacker-specified credentials. • https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3046 • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2023-32977 – jenkins-2-plugin: workflow-job: Stored XSS vulnerability in Pipeline: Job Plugin
https://notcve.org/view.php?id=CVE-2023-32977
Jenkins Pipeline: Job Plugin does not escape the display name of the build that caused an earlier build to be aborted, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to set build display names immediately. A flaw was found in the Jenkins Pipeline: Job Plugin. Affected versions of Jenkins Pipeline: Job Plugin are vulnerable to Cross-site scripting caused by improper validation of user-supplied input. This flaw allows a remote authenticated attacker to inject malicious script into a Web page, which would then be executed in a victim's Web browser within the security context of the hosting Web site once the page is viewed. The attacker could use this vulnerability to steal the victim's cookie-based authentication credentials. • https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3042 https://access.redhat.com/security/cve/CVE-2023-32977 https://bugzilla.redhat.com/show_bug.cgi?id=2207830 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2023-30532
https://notcve.org/view.php?id=CVE-2023-30532
A missing permission check in Jenkins TurboScript Plugin 1.3 and earlier allows attackers with Item/Read permission to trigger builds of jobs corresponding to the attacker-specified repository. • http://www.openwall.com/lists/oss-security/2023/04/13/3 https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2851 • CWE-862: Missing Authorization •
CVE-2023-30531
https://notcve.org/view.php?id=CVE-2023-30531
Jenkins Consul KV Builder Plugin 2.0.13 and earlier does not mask the HashiCorp Consul ACL Token on the global configuration form, increasing the potential for attackers to observe and capture it. • http://www.openwall.com/lists/oss-security/2023/04/13/3 https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2944 • CWE-312: Cleartext Storage of Sensitive Information •
CVE-2023-30530
https://notcve.org/view.php?id=CVE-2023-30530
Jenkins Consul KV Builder Plugin 2.0.13 and earlier stores the HashiCorp Consul ACL Token unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system. • http://www.openwall.com/lists/oss-security/2023/04/13/3 https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2944 • CWE-312: Cleartext Storage of Sensitive Information •