3 results (0.030 seconds)

CVSS: 6.4EPSS: 0%CPEs: 3EXPL: 0

Jenkins Credentials Plugin 1111.v35a_307992395 and earlier, except 1087.1089.v2f1b_9a_b_040e4, 1074.1076.v39c30cecb_0e2, and 2.6.1.1, does not escape the name and description of Credentials parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. El plugin de credenciales de Jenkins versiones 1111.v35a_307992395 y anteriores, excepto 1087.1089.v2f1b_9a_b_040e4, 1074.1076.v39c30cecb_0e2, y 2.6.1.1, no escapa del nombre y la descripción de los parámetros de credenciales en las visualizaciones que muestran parámetros, resultando en una vulnerabilidad de tipo cross-site scripting (XSS) almacenado que puede ser explotada por atacantes con permiso Item/Configure A flaw was found in the Jenkins credentials plugin. The Jenkins credentials plugin does not escape the name and description of Credentials parameters on views displaying parameters. This issue results in a stored Cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. • https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617 https://access.redhat.com/security/cve/CVE-2022-29036 https://bugzilla.redhat.com/show_bug.cgi?id=2074847 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

Jenkins Credentials Plugin 2.3.18 and earlier does not escape user-controlled information on a view it provides, resulting in a reflected cross-site scripting (XSS) vulnerability. Jenkins Credentials Plugin versiones 2.3.18 y anteriores, no escapa la información controlada por el usuario en una vista que la proporciona, resultando en una vulnerabilidad de tipo cross-site scripting (XSS) reflejado The reflected cross-site scripting (XSS) vulnerability was found in jenkins credentials plugin. On a `view it` there is no escape from provided by user information (user-controlled). • https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2349 https://access.redhat.com/security/cve/CVE-2021-21648 https://bugzilla.redhat.com/show_bug.cgi?id=1959545 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

Jenkins Credentials Plugin 2.1.18 and earlier allowed users with permission to create or update credentials to confirm the existence of files on the Jenkins master with an attacker-specified path, and obtain the certificate content of files containing a PKCS#12 certificate. Jenkins Credentials Plugin 2.1.18 y versiones anteriores permitieron a los usuarios con permiso crear o actualizar credenciales para confirmar la existencia de archivos en el maestro Jenkins con una attacker-specified path y obtener el contenido del certificado de los archivos que contienen un PKCS # 12 certificate. • http://seclists.org/fulldisclosure/2019/May/39 http://www.openwall.com/lists/oss-security/2019/05/21/1 http://www.securityfocus.com/bid/108462 https://access.redhat.com/errata/RHBA-2019:1605 https://access.redhat.com/errata/RHSA-2019:1636 https://jenkins.io/security/advisory/2019-05-21/#SECURITY-1322 https://wwws.nightwatchcybersecurity.com/2019/05/23/exploring-the-file-system-via-jenkins-credentials-plugin-vulnerability-cve-2019-10320 https://access.redhat.com/security/cve/CVE-20 • CWE-522: Insufficiently Protected Credentials CWE-538: Insertion of Sensitive Information into Externally-Accessible File or Directory •