2 results (0.002 seconds)

CVSS: 8.8EPSS: 1%CPEs: 1EXPL: 0

12 Jan 2022 — Jenkins Docker Commons Plugin 1.17 and earlier does not sanitize the name of an image or a tag, resulting in an OS command execution vulnerability exploitable by attackers with Item/Configure permission or able to control the contents of a previously configured job's SCM repository. Jenkins Docker Commons Plugin versiones 1.17 y anteriores, no sanea el nombre de una imagen o una etiqueta, resultando en una vulnerabilidad de ejecución de comandos del Sistema Operativo explotable por atacantes con permiso Ite... • http://www.openwall.com/lists/oss-security/2022/01/12/6 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

04 Oct 2017 — Docker Commons Plugin provides a list of applicable credential IDs to allow users configuring a job to select the one they'd like to use to authenticate with a Docker Registry. This functionality did not check permissions, allowing any user with Overall/Read permission to get a list of valid credentials IDs. Those could be used as part of an attack to capture the credentials using another vulnerability. El plugin Docker Commons proporciona una lista de ID de credenciales aplicables para permitir a los usuar... • https://jenkins.io/security/advisory/2017-07-10 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •