2 results (0.006 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

Jenkins Tests Selector Plugin 1.3.3 and earlier allows users with Item/Configure permission to read arbitrary files on the Jenkins controller. Jenkins Tests Selector Plugin versiones 1.3.3 y anteriores, permiten a usuarios con permiso Item/Configure leer archivos arbitrarios en el controlador Jenkins • http://www.openwall.com/lists/oss-security/2022/03/29/1 https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2338 • CWE-668: Exposure of Resource to Wrong Sphere •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

Jenkins Tests Selector Plugin 1.3.3 and earlier does not escape the Properties File Path option for Choosing Tests parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Jenkins Tests Selector Plugin versiones 1.3.3 y anteriores, no escapa a la opción Properties File Path para elegir los parámetros de Tests, lo que resulta en una vulnerabilidad de tipo Cross-site scripting (XSS) almacenada explotable por atacantes con permiso Item/Configure • http://www.openwall.com/lists/oss-security/2022/03/29/1 https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2262 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •