4 results (0.014 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

Jenkins Warnings Plugin 10.5.0 and earlier does not set the appropriate context for credentials lookup, allowing attackers with Item/Configure permission to access and capture credentials they are not entitled to. This fix has been backported to 10.4.1. El complemento Jenkins Warnings 10.5.0 y versiones anteriores no establece el contexto apropiado para la búsqueda de credenciales, lo que permite a los atacantes con permiso Elemento/Configurar acceder y capturar credenciales a las que no tienen derecho. Esta solución se ha actualizado a 10.4.1. • http://www.openwall.com/lists/oss-security/2023/10/25/2 https://www.jenkins.io/security/advisory/2023-10-25/#SECURITY-3265 • CWE-522: Insufficiently Protected Credentials •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

A cross-site request forgery (CSRF) vulnerability in Jenkins Warnings Plugin 5.0.1 and earlier allows attackers to execute arbitrary code. Una vulnerabilidad de tipo cross-site request forgery (CSRF) en Jenkins Warnings Plugin versiones 5.0.1 y anteriores, permite a atacantes ejecutar código arbitrario • http://www.openwall.com/lists/oss-security/2020/09/23/1 https://www.jenkins.io/security/advisory/2020-09-23/#SECURITY-2042 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

A cross-site request forgery vulnerability exists in Jenkins Warnings Plugin 5.0.0 and earlier in src/main/java/hudson/plugins/warnings/GroovyParser.java that allows attackers to execute arbitrary code via a form validation HTTP endpoint. Existe una vulnerabilidad Cross-Site Request Forgery (CSRF) en Jenkins Warnings Plugin, en versiones 5.0.0 y anteriores, en src/main/java/hudson/plugins/warnings/GroovyParser.java, que permite que los atacantes ejecuten código arbitrario mediante un endpoint HTTP de validación de formularios. • https://jenkins.io/security/advisory/2019-01-28/#SECURITY-1295%20%281%29 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Jenkins Warnings Plugin 4.64 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks. Jenkins Warnings Plugin en versiones 4.64 y anteriores procesa entidades XML externas en archivos que analiza como parte del proceso de build. Esto permite que atacantes con permisos de usuario en Jenkins extraigan secretos del master de Jenkins, realicen Server-Side Request Forgery o ataques de denegación de servicio (DoS). • https://jenkins.io/security/advisory/2018-01-22 • CWE-611: Improper Restriction of XML External Entity Reference •