3 results (0.008 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

Jenkins CloudBees CD Plugin 1.1.32 and earlier follows symbolic links to locations outside of the directory from which artifacts are published during the 'CloudBees CD - Publish Artifact' post-build step, allowing attackers able to configure jobs to publish arbitrary files from the Jenkins controller file system to the previously configured CloudBees CD server. Jenkins CloudBees CD Plugin 1.1.32 y versiones anteriores siguen enlaces simbólicos a ubicaciones fuera del directorio desde el cual se publican los artefactos durante el paso posterior a la compilación 'CloudBees CD - Publish Artifact', lo que permite a los atacantes configurar trabajos para publicar archivos arbitrarios desde Jenkins del controlador sistema de archivos al servidor de CD CloudBees previamente configurado. • http://www.openwall.com/lists/oss-security/2023/10/25/2 https://www.jenkins.io/security/advisory/2023-10-25/#SECURITY-3238 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 0

Jenkins CloudBees CD Plugin 1.1.32 and earlier follows symbolic links to locations outside of the expected directory during the cleanup process of the 'CloudBees CD - Publish Artifact' post-build step, allowing attackers able to configure jobs to delete arbitrary files on the Jenkins controller file system. Jenkins CloudBees CD Plugin 1.1.32 y versiones anteriores siguen enlaces simbólicos a ubicaciones fuera del directorio esperado durante el proceso de limpieza del paso posterior a la compilación 'CloudBees CD - Publish Artifact', lo que permite a los atacantes configurar trabajos para eliminar archivos arbitrarios en Jenkins controlador del sistema de archivos. • http://www.openwall.com/lists/oss-security/2023/10/25/2 https://www.jenkins.io/security/advisory/2023-10-25/#SECURITY-3237 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Jenkins CloudBees CD Plugin 1.1.21 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Item/Read permission to schedule builds of projects without having Item/Build permission. Jenkins CloudBees CD Plugin versiones 1.1.21 y anteriores, no llevan a cabo una comprobación de permisos en un endpoint HTTP, permitiendo a atacantes con permiso Item/Read programar compilaciones de proyectos sin tener permiso Item/Build • http://www.openwall.com/lists/oss-security/2021/04/21/2 https://www.jenkins.io/security/advisory/2021-04-21/#SECURITY-2309 •