CVE-2022-34794
https://notcve.org/view.php?id=CVE-2022-34794
Missing permission checks in Jenkins Recipe Plugin 1.2 and earlier allow attackers with Overall/Read permission to send an HTTP request to an attacker-specified URL and parse the response as XML. Una falta de comprobación de permisos en Jenkins Recipe Plugin versiones 1.2 y anteriores, permite a atacantes con permiso de lectura general enviar una petición HTTP a una URL especificada por el atacante y analizar la respuesta como XML • https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2000 • CWE-862: Missing Authorization •
CVE-2022-34793
https://notcve.org/view.php?id=CVE-2022-34793
Jenkins Recipe Plugin 1.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. Jenkins Recipe Plugin versiones 1.2 y anteriores, no configuran su analizador XML para prevenir ataques de tipo XML external entity (XXE) • https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2000 • CWE-611: Improper Restriction of XML External Entity Reference •
CVE-2022-34792
https://notcve.org/view.php?id=CVE-2022-34792
A cross-site request forgery (CSRF) vulnerability in Jenkins Recipe Plugin 1.2 and earlier allows attackers to send an HTTP request to an attacker-specified URL and parse the response as XML. Una vulnerabilidad de tipo cross-site request forgery (CSRF) en Jenkins Recipe Plugin versiones 1.2 y anteriores, permite a atacantes enviar una petición HTTP a una URL especificada por el atacante y analizar la respuesta como XML • https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2000 • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2022-34791
https://notcve.org/view.php?id=CVE-2022-34791
Jenkins Validating Email Parameter Plugin 1.10 and earlier does not escape the name and description of its parameter type, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Jenkins Validating Email Parameter Plugin versiones 1.10 y anteriores, no escapa del nombre y la descripción de su tipo de parámetro, lo que da lugar a una vulnerabilidad de tipo cross-site scripting (XSS) almacenada explotable por atacantes con permiso de Item/Configure • https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2165 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2022-34790
https://notcve.org/view.php?id=CVE-2022-34790
Jenkins eXtreme Feedback Panel Plugin 2.0.1 and earlier does not escape the job names used in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Jenkins eXtreme Feedback Panel Plugin versiones 2.0.1 y anteriores, no escapa de los nombres de los trabajos usados en la información sobre herramientas, lo que da lugar a una vulnerabilidad de tipo cross-site scripting (XSS) almacenada que puede ser explotada por atacantes con permiso de Item/Configure • https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-1939 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •