Page 6 of 35 results (0.009 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 1

A missing permission check in Jenkins Artifactory Plugin 3.2.2 and earlier in ArtifactoryBuilder.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. Una falta de comprobación de permisos en el Plugin Artifactory de Jenkins versión 3.2.2 y anteriores, en ArtifactoryBuilder.DescriptorImpl#doTestConnection permitió a los usuarios con acceso General y de Lectura conectarse a una URL especificada por el atacante usando los ID de credenciales especificadas por el atacante conseguidas por medio de otro método, capturando credenciales almacenadas en Jenkins . • http://www.openwall.com/lists/oss-security/2019/05/31/2 http://www.securityfocus.com/bid/108540 https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20%281%29 https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0787 • CWE-862: Missing Authorization •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 1

A missing permission check in Jenkins Artifactory Plugin 3.2.3 and earlier in various 'fillCredentialsIdItems' methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins. Una verificación de falta de permisos en Jenkins Artifactory Plugin 3.2.3 y versiones anteriores en varios métodos 'fillCredentialsIdItems' permitía a los usuarios con acceso General / Lectura para enumerar las credenciales. • http://www.openwall.com/lists/oss-security/2019/05/31/2 http://www.securityfocus.com/bid/108540 https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20%282%29 https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0846 • CWE-862: Missing Authorization •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

A cross-site request forgery vulnerability in Jenkins Artifactory Plugin 3.2.2 and earlier in ArtifactoryBuilder.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. Una vulnerabilidad de tipo cross-site request forgery (CSRF) en el Plugin Artifactory de Jenkins versión 3.2.2 y anteriores, en ArtifactoryBuilder.DescriptorImpl#doTestConnection permitía a los usuarios con acceso General y de Lectura conectarse a una URL especificada por el atacante usando ID de credenciales especificadas por el atacante conseguidas por medio otro método, capturando credenciales almacenadas en Jenkins. • http://www.openwall.com/lists/oss-security/2019/05/31/2 http://www.securityfocus.com/bid/108540 https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20%281%29 https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0787 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 9.8EPSS: 61%CPEs: 1EXPL: 2

An issue was discovered in JFrog Artifactory 6.7.3. By default, the access-admin account is used to reset the password of the admin account in case an administrator gets locked out from the Artifactory console. This is only allowable from a connection directly from localhost, but providing a X-Forwarded-For HTTP header to the request allows an unauthenticated user to login with the default credentials of the access-admin account while bypassing the whitelist of allowed IP addresses. The access-admin account can use Artifactory's API to request authentication tokens for all users including the admin account and, in turn, assume full control of all artifacts and repositories managed by Artifactory. Existe un problema en JFrog Artifactory versión 6.7.3. • http://packetstormsecurity.com/files/152172/JFrog-Artifactory-Administrator-Authentication-Bypass.html https://www.ciphertechs.com/jfrog-artifactory-advisory https://www.jfrog.com/confluence/display/RTF/Release+Notes#ReleaseNotes-Artifactory6.8.6 •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 3

JFrog Artifactory Pro 6.5.9 has Incorrect Access Control. JFrog Artifactory Pro 6.5.9 tiene un control de acceso incorrecto. The SAML SSO addon in JFrog Artifactory version 6.5.9 does not properly validate the XML signature in the SAMLResponse field send to the URL /webapp/saml/loginResponse. An attacker can use this flaw to login as any user if they already can login as some user. • http://packetstormsecurity.com/files/152137/JFrog-Artifactory-Pro-6.5.9-Signature-Validation.html http://seclists.org/fulldisclosure/2019/Mar/34 http://www.securityfocus.com/bid/107518 https://bintray.com/jfrog/artifactory-pro/jfrog-artifactory-pro-zip/6.5.13#release https://lists.openwall.net/full-disclosure/2019/03/19/3 • CWE-345: Insufficient Verification of Data Authenticity •