Page 8 of 342 results (0.005 seconds)

CVSS: 9.0EPSS: 35%CPEs: 1EXPL: 0

27 Nov 2024 — Jenkins Simple Queue Plugin 1.4.4 and earlier does not escape the view name, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with View/Create permission. • https://www.jenkins.io/security/advisory/2024-11-27/#SECURITY-3467 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

13 Nov 2024 — Jenkins OpenId Connect Authentication Plugin 4.418.vccc7061f5b_6d and earlier does not invalidate the previous session on login. • https://www.jenkins.io/security/advisory/2024-11-13/#SECURITY-3473 • CWE-613: Insufficient Session Expiration •

CVSS: 9.0EPSS: 2%CPEs: 1EXPL: 0

13 Nov 2024 — Jenkins Authorize Project Plugin 1.7.2 and earlier evaluates a string containing the job name with JavaScript on the Authorization view, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. • https://www.jenkins.io/security/advisory/2024-11-13/#SECURITY-3010 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 0

02 Oct 2024 — Jenkins OpenId Connect Authentication Plugin 4.354.v321ce67a_1de8 and earlier does not check the `iss` (Issuer) claim of an ID Token, allowing attackers to subvert the authentication flow, potentially gaining administrator access to Jenkins. • https://www.jenkins.io/security/advisory/2024-10-02/#SECURITY-3441%20(2) • CWE-287: Improper Authentication •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 0

02 Oct 2024 — Jenkins OpenId Connect Authentication Plugin 4.354.v321ce67a_1de8 and earlier does not check the `aud` (Audience) claim of an ID Token, allowing attackers to subvert the authentication flow, potentially gaining administrator access to Jenkins. • https://www.jenkins.io/security/advisory/2024-10-02/#SECURITY-3441%20(1) • CWE-287: Improper Authentication •

CVSS: 7.4EPSS: 0%CPEs: 4EXPL: 0

02 Oct 2024 — If an attempt is made to create an item of a type prohibited by `ACL#hasCreatePermission2` or `TopLevelItemDescriptor#isApplicableIn(ItemGroup)` through the Jenkins CLI or the REST API and either of these checks fail, Jenkins 2.478 and earlier, LTS 2.462.2 and earlier creates the item in memory, only deleting it from disk, allowing attackers with Item/Configure permission to save the item to persist it, effectively bypassing the item creation restriction. A flaw was found in Jenkins. When attempting to crea... • https://www.jenkins.io/security/advisory/2024-10-02/#SECURITY-3448 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') CWE-1220: Insufficient Granularity of Access Control •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

07 Aug 2024 — Jenkins 2.470 and earlier, LTS 2.452.3 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to access other users' "My Views". • https://www.jenkins.io/security/advisory/2024-08-07/#SECURITY-3349 • CWE-862: Missing Authorization •

CVSS: 9.0EPSS: 65%CPEs: 4EXPL: 5

07 Aug 2024 — Jenkins 2.470 and earlier, LTS 2.452.3 and earlier allows agent processes to read arbitrary files from the Jenkins controller file system by using the `ClassLoaderProxy#fetchJar` method in the Remoting library. A vulnerability was found in the Remoting library in Jenkins core, which handles communication between the Jenkins controller and agents. The ClassLoaderProxy#fetchJar function may allow malicious agents or attackers with Agent/Connect permission to read arbitrary files from the Jenkins controller's ... • https://github.com/v9d0g/CVE-2024-43044-POC • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-754: Improper Check for Unusual or Exceptional Conditions •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 0

24 May 2024 — Jenkins Report Info Plugin 1.2 and earlier does not perform path validation of the workspace directory while serving report files, allowing attackers with Item/Configure permission to retrieve Surefire failures, PMD violations, Findbugs bugs, and Checkstyle errors on the controller file system by editing the workspace path. El complemento Jenkins Report Info 1.2 y versiones anteriores no realiza la validación de la ruta del directorio del espacio de trabajo mientras sirve archivos de informes, lo que permit... • http://www.openwall.com/lists/oss-security/2024/05/24/2 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

02 May 2024 — Jenkins Subversion Partial Release Manager Plugin 1.0.1 and earlier programmatically disables the fix for CVE-2016-3721 whenever a build is triggered from a release tag, by setting the Java system property 'hudson.model.ParametersAction.keepUndefinedParameters'. El complemento Jenkins Subversion Partial Release Manager 1.0.1 y versiones anteriores deshabilita mediante programación la solución para CVE-2016-3721 cada vez que se activa una compilación desde una etiqueta de versión, estableciendo la propiedad ... • http://www.openwall.com/lists/oss-security/2024/05/02/3 • CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') •