CVE-2023-25766
https://notcve.org/view.php?id=CVE-2023-25766
A missing permission check in Jenkins Azure Credentials Plugin 253.v887e0f9e898b and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. • http://www.openwall.com/lists/oss-security/2023/02/15/4 https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-1757 • CWE-862: Missing Authorization •
CVE-2023-25768
https://notcve.org/view.php?id=CVE-2023-25768
A missing permission check in Jenkins Azure Credentials Plugin 253.v887e0f9e898b and earlier allows attackers with Overall/Read permission to connect to an attacker-specified web server. • http://www.openwall.com/lists/oss-security/2023/02/15/4 https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-1756 • CWE-862: Missing Authorization •
CVE-2023-25767
https://notcve.org/view.php?id=CVE-2023-25767
A cross-site request forgery (CSRF) vulnerability in Jenkins Azure Credentials Plugin 253.v887e0f9e898b and earlier allows attackers to connect to an attacker-specified web server. • http://www.openwall.com/lists/oss-security/2023/02/15/4 https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-1756 • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2023-24425
https://notcve.org/view.php?id=CVE-2023-24425
Jenkins Kubernetes Credentials Provider Plugin 1.208.v128ee9800c04 and earlier does not set the appropriate context for Kubernetes credentials lookup, allowing attackers with Item/Configure permission to access and potentially capture Kubernetes credentials they are not entitled to. El complemento Kubernetes Credentials Provider de Jenkins en su versión 1.208.v128ee9800c04 y anteriores no establece el contexto apropiado para la búsqueda de credenciales de Kubernetes, lo que permite a los atacantes con permiso Item/Configure acceder y potencialmente capturar las credenciales de Kubernetes a las que no tienen derecho. • https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-3022 •
CVE-2022-29036 – credentials: Stored XSS vulnerabilities in jenkins plugin
https://notcve.org/view.php?id=CVE-2022-29036
Jenkins Credentials Plugin 1111.v35a_307992395 and earlier, except 1087.1089.v2f1b_9a_b_040e4, 1074.1076.v39c30cecb_0e2, and 2.6.1.1, does not escape the name and description of Credentials parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. El plugin de credenciales de Jenkins versiones 1111.v35a_307992395 y anteriores, excepto 1087.1089.v2f1b_9a_b_040e4, 1074.1076.v39c30cecb_0e2, y 2.6.1.1, no escapa del nombre y la descripción de los parámetros de credenciales en las visualizaciones que muestran parámetros, resultando en una vulnerabilidad de tipo cross-site scripting (XSS) almacenado que puede ser explotada por atacantes con permiso Item/Configure A flaw was found in the Jenkins credentials plugin. The Jenkins credentials plugin does not escape the name and description of Credentials parameters on views displaying parameters. This issue results in a stored Cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. • https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617 https://access.redhat.com/security/cve/CVE-2022-29036 https://bugzilla.redhat.com/show_bug.cgi?id=2074847 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •