3 results (0.009 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

A cross-site request forgery (CSRF) vulnerability in Jenkins Reverse Proxy Auth Plugin 1.7.4 and earlier allows attackers to connect to an attacker-specified LDAP server using attacker-specified credentials. • https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3002 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

Jenkins Reverse Proxy Auth Plugin 1.7.3 and earlier stores the LDAP manager password unencrypted in the global config.xml file on the Jenkins controller where it can be viewed by attackers with access to the Jenkins controller file system. Jenkins Reverse Proxy Auth Plugin 1.7.3 y versiones anteriores almacena la contraseña del administrador LDAP sin cifrar en el archivo global config.xml en el controlador de Jenkins, donde los atacantes con acceso al sistema de archivos del controlador de Jenkins pueden verla. • http://www.openwall.com/lists/oss-security/2022/11/15/4 https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2094 • CWE-522: Insufficiently Protected Credentials •

CVSS: 3.3EPSS: 0%CPEs: 1EXPL: 0

An exposure of sensitive information vulnerability exists in Jenkins Reverse Proxy Auth Plugin 1.5 and older in ReverseProxySecurityRealm#authContext that allows attackers with local file system access to obtain a list of authorities for logged in users. Existe una vulnerabilidad de exposición de información sensible en el plugin Reverse Proxy Auth en Jenkins, en versiones 1.5 y anteriores, en ReverseProxySecurityRealm#authContext que permite que atacantes con acceso al sistema de archivos local obtengan una lista de autoridades para los usuarios que hayan iniciado sesión. • https://jenkins.io/security/advisory/2018-03-26/#SECURITY-736 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •