CVE-2022-43408 – jenkins-plugin/pipeline-stage-view: CSRF protection for any URL can be bypassed in Pipeline: Stage View Plugin
https://notcve.org/view.php?id=CVE-2022-43408
Jenkins Pipeline: Stage View Plugin 2.26 and earlier does not correctly encode the ID of 'input' steps when using it to generate URLs to proceed or abort Pipeline builds, allowing attackers able to configure Pipelines to specify 'input' step IDs resulting in URLs that would bypass the CSRF protection of any target URL in Jenkins. Pipeline de Jenkins: Stage View Plugin versiones 2.26 y anteriores, no codifica correctamente el ID de los pasos "input" cuando es usado para generar URLs para proceder o abortar construcciones de Pipeline, lo que permite a atacantes capaces de configurar Pipelines para especificar IDs de pasos de "input" que resulten en URLs que puedan omitir la protección de tipo CSRF de cualquier URL de destino en Jenkins A Cross-site request forgery (CSRF) vulnerability was found in a Jenkins plugin. This issue may allow an authenticated attacker to access Jenkins builds, bypassing CSRF protections. • http://www.openwall.com/lists/oss-security/2022/10/19/3 https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2828 https://access.redhat.com/security/cve/CVE-2022-43408 https://bugzilla.redhat.com/show_bug.cgi?id=2136388 • CWE-352: Cross-Site Request Forgery (CSRF) CWE-838: Inappropriate Encoding for Output Context •
CVE-2022-43435
https://notcve.org/view.php?id=CVE-2022-43435
Jenkins 360 FireLine Plugin 1.7.2 and earlier programmatically disables Content-Security-Policy protection for user-generated content in workspaces, archived artifacts, etc. that Jenkins offers for download. Jenkins 360 FireLine Plugin versiones 1.7.2 y anteriores, deshabilita mediante programación la protección de la política de seguridad de contenidos generada por el usuario en espacios de trabajo, artefactos archivados, etc. que Jenkins ofrece para su descarga • http://www.openwall.com/lists/oss-security/2022/10/19/3 https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2866 •
CVE-2022-41255
https://notcve.org/view.php?id=CVE-2022-41255
Jenkins CONS3RT Plugin 1.0.0 and earlier stores Cons3rt API token unencrypted in job config.xml files on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system. Jenkins CONS3RT Plugin versiones 1.0.0 y anteriores, almacena el token de la API Cons3rt sin cifrar en los archivos config.xml de los trabajos en el controlador Jenkins, donde puede ser visualizado por los usuarios con acceso al sistema de archivos del controlador Jenkins • http://www.openwall.com/lists/oss-security/2022/09/21/5 https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2759 • CWE-522: Insufficiently Protected Credentials •
CVE-2022-41254
https://notcve.org/view.php?id=CVE-2022-41254
Missing permission checks in Jenkins CONS3RT Plugin 1.0.0 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. Una falta de comprobaciones de permisos en Jenkins CONS3RT Plugin versiones 1.0.0 y anteriores, permite a atacantes con permiso Overall/Read conectarse a un servidor HTTP especificado por el atacante usando los ID de credenciales especificados por el atacante obtenidos mediante otro método, capturando las credenciales almacenadas en Jenkins • http://www.openwall.com/lists/oss-security/2022/09/21/5 https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2751 • CWE-862: Missing Authorization •
CVE-2022-41253
https://notcve.org/view.php?id=CVE-2022-41253
A cross-site request forgery (CSRF) vulnerability in Jenkins CONS3RT Plugin 1.0.0 and earlier allows attackers to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. Una vulnerabilidad de tipo cross-site request forgery (CSRF) en Jenkins CONS3RT Plugin versiones 1.0.0 y anteriores, permite a atacantes conectarse a un servidor HTTP especificado por el atacante usando IDs de credenciales especificados por el atacante obtenidos mediante otro método, capturando credenciales almacenadas en Jenkins • http://www.openwall.com/lists/oss-security/2022/09/21/5 https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2751 • CWE-352: Cross-Site Request Forgery (CSRF) •