jenkins CVE Vulnerabilities & Metrics

Focus on jenkins vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About jenkins Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with jenkins. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total jenkins CVEs: 1542
Earliest CVE date: 01 Dec 2011, 11:55 UTC
Latest CVE date: 02 Oct 2024, 16:15 UTC

Latest CVE reference: CVE-2024-47805

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 5

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -97.42%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -97.42%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical jenkins CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.46

Max CVSS: 10.0

Critical CVEs (≥9): 11

CVSS Range vs. Count

Range Count
0.0-3.9 642
4.0-6.9 896
7.0-8.9 27
9.0-10.0 11

CVSS Distribution Chart

Top 5 Highest CVSS jenkins CVEs

These are the five CVEs with the highest CVSS scores for jenkins, sorted by severity first and recency.

All CVEs for jenkins

CVE-2024-47805 jenkins vulnerability CVSS: 0 02 Oct 2024, 16:15 UTC

Jenkins Credentials Plugin 1380.va_435002fa_924 and earlier, except 1371.1373.v4eb_fa_b_7161e9, does not redact encrypted values of credentials using the `SecretBytes` type when accessing item `config.xml` via REST API or CLI.

CVE-2024-47804 jenkins vulnerability CVSS: 0 02 Oct 2024, 16:15 UTC

If an attempt is made to create an item of a type prohibited by `ACL#hasCreatePermission2` or `TopLevelItemDescriptor#isApplicableIn(ItemGroup)` through the Jenkins CLI or the REST API and either of these checks fail, Jenkins 2.478 and earlier, LTS 2.462.2 and earlier creates the item in memory, only deleting it from disk, allowing attackers with Item/Configure permission to save the item to persist it, effectively bypassing the item creation restriction.

CVE-2024-47803 jenkins vulnerability CVSS: 0 02 Oct 2024, 16:15 UTC

Jenkins 2.478 and earlier, LTS 2.462.2 and earlier does not redact multi-line secret values in error messages generated for form submissions involving the `secretTextarea` form field.

CVE-2024-43045 jenkins vulnerability CVSS: 0 07 Aug 2024, 14:15 UTC

Jenkins 2.470 and earlier, LTS 2.452.3 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to access other users' "My Views".

CVE-2024-43044 jenkins vulnerability CVSS: 0 07 Aug 2024, 14:15 UTC

Jenkins 2.470 and earlier, LTS 2.452.3 and earlier allows agent processes to read arbitrary files from the Jenkins controller file system by using the `ClassLoaderProxy#fetchJar` method in the Remoting library.

CVE-2024-28155 jenkins vulnerability CVSS: 0 06 Mar 2024, 17:15 UTC

Jenkins AppSpider Plugin 1.0.16 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to obtain information about available scan config names, engine group names, and client names.

CVE-2024-28154 jenkins vulnerability CVSS: 0 06 Mar 2024, 17:15 UTC

Jenkins MQ Notifier Plugin 1.4.0 and earlier logs potentially sensitive build parameters as part of debug information in build logs by default.

CVE-2024-28153 jenkins vulnerability CVSS: 0 06 Mar 2024, 17:15 UTC

Jenkins OWASP Dependency-Check Plugin 5.4.5 and earlier does not escape vulnerability metadata from Dependency-Check reports, resulting in a stored cross-site scripting (XSS) vulnerability.

CVE-2024-23905 jenkins vulnerability CVSS: 0 24 Jan 2024, 18:15 UTC

Jenkins Red Hat Dependency Analytics Plugin 0.7.1 and earlier programmatically disables Content-Security-Policy protection for user-generated content in workspaces, archived artifacts, etc. that Jenkins offers for download.

CVE-2024-23903 jenkins vulnerability CVSS: 0 24 Jan 2024, 18:15 UTC

Jenkins GitLab Branch Source Plugin 684.vea_fa_7c1e2fe3 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token.

CVE-2024-23902 jenkins vulnerability CVSS: 0 24 Jan 2024, 18:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins GitLab Branch Source Plugin 684.vea_fa_7c1e2fe3 and earlier allows attackers to connect to an attacker-specified URL.

CVE-2024-23901 jenkins vulnerability CVSS: 0 24 Jan 2024, 18:15 UTC

Jenkins GitLab Branch Source Plugin 684.vea_fa_7c1e2fe3 and earlier unconditionally discovers projects that are shared with the configured owner group, allowing attackers to configure and share a project, resulting in a crafted Pipeline being built by Jenkins during the next scan of the group.

CVE-2024-23900 jenkins vulnerability CVSS: 0 24 Jan 2024, 18:15 UTC

Jenkins Matrix Project Plugin 822.v01b_8c85d16d2 and earlier does not sanitize user-defined axis names of multi-configuration projects, allowing attackers with Item/Configure permission to create or replace any config.xml files on the Jenkins controller file system with content not controllable by the attackers.

CVE-2024-23899 jenkins vulnerability CVSS: 0 24 Jan 2024, 18:15 UTC

Jenkins Git server Plugin 99.va_0826a_b_cdfa_d and earlier does not disable a feature of its command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing attackers with Overall/Read permission to read content from arbitrary files on the Jenkins controller file system.

CVE-2024-23898 jenkins vulnerability CVSS: 0 24 Jan 2024, 18:15 UTC

Jenkins 2.217 through 2.441 (both inclusive), LTS 2.222.1 through 2.426.2 (both inclusive) does not perform origin validation of requests made through the CLI WebSocket endpoint, resulting in a cross-site WebSocket hijacking (CSWSH) vulnerability, allowing attackers to execute CLI commands on the Jenkins controller.

CVE-2024-23897 jenkins vulnerability CVSS: 0 24 Jan 2024, 18:15 UTC

Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.

CVE-2023-50779 jenkins vulnerability CVSS: 0 13 Dec 2023, 18:15 UTC

Missing permission checks in Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified URL using an attacker-specified token.

CVE-2023-50778 jenkins vulnerability CVSS: 0 13 Dec 2023, 18:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier allows attackers to connect to an attacker-specified URL using an attacker-specified token.

CVE-2023-50777 jenkins vulnerability CVSS: 0 13 Dec 2023, 18:15 UTC

Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier does not mask PaaSLane authentication tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them.

CVE-2023-50776 jenkins vulnerability CVSS: 0 13 Dec 2023, 18:15 UTC

Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier stores PaaSLane authentication tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.

CVE-2023-50775 jenkins vulnerability CVSS: 0 13 Dec 2023, 18:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Deployment Dashboard Plugin 1.0.10 and earlier allows attackers to copy jobs.

CVE-2023-50774 jenkins vulnerability CVSS: 0 13 Dec 2023, 18:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins HTMLResource Plugin 1.02 and earlier allows attackers to delete arbitrary files on the Jenkins controller file system.

CVE-2023-50773 jenkins vulnerability CVSS: 0 13 Dec 2023, 18:15 UTC

Jenkins Dingding JSON Pusher Plugin 2.0 and earlier does not mask access tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them.

CVE-2023-50772 jenkins vulnerability CVSS: 0 13 Dec 2023, 18:15 UTC

Jenkins Dingding JSON Pusher Plugin 2.0 and earlier stores access tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.

CVE-2023-50771 jenkins vulnerability CVSS: 0 13 Dec 2023, 18:15 UTC

Jenkins OpenId Connect Authentication Plugin 2.6 and earlier improperly determines that a redirect URL after login is legitimately pointing to Jenkins, allowing attackers to perform phishing attacks.

CVE-2023-50770 jenkins vulnerability CVSS: 0 13 Dec 2023, 18:15 UTC

Jenkins OpenId Connect Authentication Plugin 2.6 and earlier stores a password of a local user account used as an anti-lockout feature in a recoverable format, allowing attackers with access to the Jenkins controller file system to recover the plain text password of that account, likely gaining administrator access to Jenkins.

CVE-2023-50769 jenkins vulnerability CVSS: 0 13 Dec 2023, 18:15 UTC

Missing permission checks in Jenkins Nexus Platform Plugin 3.18.0-03 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2023-50768 jenkins vulnerability CVSS: 0 13 Dec 2023, 18:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Nexus Platform Plugin 3.18.0-03 and earlier allows attackers to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2023-50767 jenkins vulnerability CVSS: 0 13 Dec 2023, 18:15 UTC

Missing permission checks in Jenkins Nexus Platform Plugin 3.18.0-03 and earlier allow attackers with Overall/Read permission to send an HTTP request to an attacker-specified URL and parse the response as XML.

CVE-2023-50766 jenkins vulnerability CVSS: 0 13 Dec 2023, 18:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Nexus Platform Plugin 3.18.0-03 and earlier allows attackers to send an HTTP request to an attacker-specified URL and parse the response as XML.

CVE-2023-50765 jenkins vulnerability CVSS: 0 13 Dec 2023, 18:15 UTC

A missing permission check in Jenkins Scriptler Plugin 342.v6a_89fd40f466 and earlier allows attackers with Overall/Read permission to read the contents of a Groovy script by knowing its ID.

CVE-2023-50764 jenkins vulnerability CVSS: 0 13 Dec 2023, 18:15 UTC

Jenkins Scriptler Plugin 342.v6a_89fd40f466 and earlier does not restrict a file name query parameter in an HTTP endpoint, allowing attackers with Scriptler/Configure permission to delete arbitrary files on the Jenkins controller file system.

CVE-2023-49674 jenkins vulnerability CVSS: 0 29 Nov 2023, 14:15 UTC

A missing permission check in Jenkins NeuVector Vulnerability Scanner Plugin 1.22 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified hostname and port using attacker-specified username and password.

CVE-2023-49673 jenkins vulnerability CVSS: 0 29 Nov 2023, 14:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins NeuVector Vulnerability Scanner Plugin 1.22 and earlier allows attackers to connect to an attacker-specified hostname and port using attacker-specified username and password.

CVE-2023-49656 jenkins vulnerability CVSS: 0 29 Nov 2023, 14:15 UTC

Jenkins MATLAB Plugin 2.11.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2023-49655 jenkins vulnerability CVSS: 0 29 Nov 2023, 14:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins MATLAB Plugin 2.11.0 and earlier allows attackers to have Jenkins parse an XML file from the Jenkins controller file system.

CVE-2023-49654 jenkins vulnerability CVSS: 0 29 Nov 2023, 14:15 UTC

Missing permission checks in Jenkins MATLAB Plugin 2.11.0 and earlier allow attackers to have Jenkins parse an XML file from the Jenkins controller file system.

CVE-2023-49653 jenkins vulnerability CVSS: 0 29 Nov 2023, 14:15 UTC

Jenkins Jira Plugin 3.11 and earlier does not set the appropriate context for credentials lookup, allowing attackers with Item/Configure permission to access and capture credentials they are not entitled to.

CVE-2023-49652 jenkins vulnerability CVSS: 0 29 Nov 2023, 14:15 UTC

Incorrect permission checks in Jenkins Google Compute Engine Plugin 4.550.vb_327fca_3db_11 and earlier allow attackers with global Item/Configure permission (while lacking Item/Configure permission on any particular job) to enumerate system-scoped credentials IDs of credentials stored in Jenkins and to connect to Google Cloud Platform using attacker-specified credentials IDs obtained through another method, to obtain information about existing projects. This fix has been backported to 4.3.17.1.

CVE-2023-46658 jenkins vulnerability CVSS: 0 25 Oct 2023, 18:17 UTC

Jenkins MSTeams Webhook Trigger Plugin 0.1.1 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token.

CVE-2023-46657 jenkins vulnerability CVSS: 0 25 Oct 2023, 18:17 UTC

Jenkins Gogs Plugin 1.0.15 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token.

CVE-2023-46655 jenkins vulnerability CVSS: 0 25 Oct 2023, 18:17 UTC

Jenkins CloudBees CD Plugin 1.1.32 and earlier follows symbolic links to locations outside of the directory from which artifacts are published during the 'CloudBees CD - Publish Artifact' post-build step, allowing attackers able to configure jobs to publish arbitrary files from the Jenkins controller file system to the previously configured CloudBees CD server.

CVE-2023-46654 jenkins vulnerability CVSS: 0 25 Oct 2023, 18:17 UTC

Jenkins CloudBees CD Plugin 1.1.32 and earlier follows symbolic links to locations outside of the expected directory during the cleanup process of the 'CloudBees CD - Publish Artifact' post-build step, allowing attackers able to configure jobs to delete arbitrary files on the Jenkins controller file system.

CVE-2023-46653 jenkins vulnerability CVSS: 0 25 Oct 2023, 18:17 UTC

Jenkins lambdatest-automation Plugin 1.20.10 and earlier logs LAMBDATEST Credentials access token at the INFO level, potentially resulting in its exposure.

CVE-2023-46652 jenkins vulnerability CVSS: 0 25 Oct 2023, 18:17 UTC

A missing permission check in Jenkins lambdatest-automation Plugin 1.20.9 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of LAMBDATEST credentials stored in Jenkins.

CVE-2023-46651 jenkins vulnerability CVSS: 0 25 Oct 2023, 18:17 UTC

Jenkins Warnings Plugin 10.5.0 and earlier does not set the appropriate context for credentials lookup, allowing attackers with Item/Configure permission to access and capture credentials they are not entitled to. This fix has been backported to 10.4.1.

CVE-2023-46650 jenkins vulnerability CVSS: 0 25 Oct 2023, 18:17 UTC

Jenkins GitHub Plugin 1.37.3 and earlier does not escape the GitHub project URL on the build page when showing changes, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2023-36478 jenkins vulnerability CVSS: 0 10 Oct 2023, 17:15 UTC

Eclipse Jetty provides a web server and servlet container. In versions 11.0.0 through 11.0.15, 10.0.0 through 10.0.15, and 9.0.0 through 9.4.52, an integer overflow in `MetaDataBuilder.checkSize` allows for HTTP/2 HPACK header values to exceed their size limit. `MetaDataBuilder.java` determines if a header name or value exceeds the size limit, and throws an exception if the limit is exceeded. However, when length is very large and huffman is true, the multiplication by 4 in line 295 will overflow, and length will become negative. `(_size+length)` will now be negative, and the check on line 296 will not be triggered. Furthermore, `MetaDataBuilder.checkSize` allows for user-entered HPACK header value sizes to be negative, potentially leading to a very large buffer allocation later on when the user-entered size is multiplied by 2. This means that if a user provides a negative length value (or, more precisely, a length value which, when multiplied by the 4/3 fudge factor, is negative), and this length value is a very large positive number when multiplied by 2, then the user can cause a very large buffer to be allocated on the server. Users of HTTP/2 can be impacted by a remote denial of service attack. The issue has been fixed in versions 11.0.16, 10.0.16, and 9.4.53. There are no known workarounds.

CVE-2023-44487 jenkins vulnerability CVSS: 0 10 Oct 2023, 14:15 UTC

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

CVE-2023-43502 jenkins vulnerability CVSS: 0 20 Sep 2023, 17:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Build Failure Analyzer Plugin 2.4.1 and earlier allows attackers to delete Failure Causes.

CVE-2023-43501 jenkins vulnerability CVSS: 0 20 Sep 2023, 17:15 UTC

A missing permission check in Jenkins Build Failure Analyzer Plugin 2.4.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified hostname and port using attacker-specified username and password.

CVE-2023-43500 jenkins vulnerability CVSS: 0 20 Sep 2023, 17:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Build Failure Analyzer Plugin 2.4.1 and earlier allows attackers to connect to an attacker-specified hostname and port using attacker-specified username and password.

CVE-2023-43499 jenkins vulnerability CVSS: 0 20 Sep 2023, 17:15 UTC

Jenkins Build Failure Analyzer Plugin 2.4.1 and earlier does not escape Failure Cause names in build logs, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create or update Failure Causes.

CVE-2023-43498 jenkins vulnerability CVSS: 0 20 Sep 2023, 17:15 UTC

In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file uploads using MultipartFormDataParser creates temporary files in the default system temporary directory with the default permissions for newly created files, potentially allowing attackers with access to the Jenkins controller file system to read and write the files before they are used.

CVE-2023-43497 jenkins vulnerability CVSS: 0 20 Sep 2023, 17:15 UTC

In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file uploads using the Stapler web framework creates temporary files in the default system temporary directory with the default permissions for newly created files, potentially allowing attackers with access to the Jenkins controller file system to read and write the files before they are used.

CVE-2023-43496 jenkins vulnerability CVSS: 0 20 Sep 2023, 17:15 UTC

Jenkins 2.423 and earlier, LTS 2.414.1 and earlier creates a temporary file in the system temporary directory with the default permissions for newly created files when installing a plugin from a URL, potentially allowing attackers with access to the system temporary directory to replace the file before it is installed in Jenkins, potentially resulting in arbitrary code execution.

CVE-2023-43495 jenkins vulnerability CVSS: 0 20 Sep 2023, 17:15 UTC

Jenkins 2.423 and earlier, LTS 2.414.1 and earlier does not escape the value of the 'caption' constructor parameter of 'ExpandableDetailsNote', resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control this parameter.

CVE-2023-43494 jenkins vulnerability CVSS: 0 20 Sep 2023, 17:15 UTC

Jenkins 2.50 through 2.423 (both inclusive), LTS 2.60.1 through 2.414.1 (both inclusive) does not exclude sensitive build variables (e.g., password parameter values) from the search in the build history widget, allowing attackers with Item/Read permission to obtain values of sensitive variables used in builds by iteratively testing different characters until the correct sequence is discovered.

CVE-2023-41947 jenkins vulnerability CVSS: 0 06 Sep 2023, 13:15 UTC

A missing permission check in Jenkins Frugal Testing Plugin 1.1 and earlier allows attackers with Overall/Read permission to connect to Frugal Testing using attacker-specified credentials.

CVE-2023-41946 jenkins vulnerability CVSS: 0 06 Sep 2023, 13:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Frugal Testing Plugin 1.1 and earlier allows attackers to connect to Frugal Testing using attacker-specified credentials, and to retrieve test IDs and names from Frugal Testing, if a valid credential corresponds to the attacker-specified username.

CVE-2023-41945 jenkins vulnerability CVSS: 0 06 Sep 2023, 13:15 UTC

Jenkins Assembla Auth Plugin 1.14 and earlier does not verify that the permissions it grants are enabled, resulting in users with EDIT permissions to be granted Overall/Manage and Overall/SystemRead permissions, even if those permissions are disabled and should not be granted.

CVE-2023-41944 jenkins vulnerability CVSS: 0 06 Sep 2023, 13:15 UTC

Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not escape the queue name parameter passed to a form validation URL, when rendering an error message, resulting in an HTML injection vulnerability.

CVE-2023-41943 jenkins vulnerability CVSS: 0 06 Sep 2023, 13:15 UTC

Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to clear the SQS queue.

CVE-2023-41942 jenkins vulnerability CVSS: 0 06 Sep 2023, 13:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier allows attackers to clear the SQS queue.

CVE-2023-41941 jenkins vulnerability CVSS: 0 06 Sep 2023, 13:15 UTC

A missing permission check in Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of AWS credentials stored in Jenkins.

CVE-2023-41940 jenkins vulnerability CVSS: 0 06 Sep 2023, 13:15 UTC

Jenkins TAP Plugin 2.3 and earlier does not escape TAP file contents, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control TAP file contents.

CVE-2023-41939 jenkins vulnerability CVSS: 0 06 Sep 2023, 13:15 UTC

Jenkins SSH2 Easy Plugin 1.4 and earlier does not verify that permissions configured to be granted are enabled, potentially allowing users formerly granted (typically optional permissions, like Overall/Manage) to access functionality they're no longer entitled to.

CVE-2023-41938 jenkins vulnerability CVSS: 0 06 Sep 2023, 13:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Ivy Plugin 2.5 and earlier allows attackers to delete disabled modules.

CVE-2023-41937 jenkins vulnerability CVSS: 0 06 Sep 2023, 13:15 UTC

Jenkins Bitbucket Push and Pull Request Plugin 2.4.0 through 2.8.3 (both inclusive) trusts values provided in the webhook payload, including certain URLs, and uses configured Bitbucket credentials to connect to those URLs, allowing attackers to capture Bitbucket credentials stored in Jenkins by sending a crafted webhook payload.

CVE-2023-41936 jenkins vulnerability CVSS: 0 06 Sep 2023, 13:15 UTC

Jenkins Google Login Plugin 1.7 and earlier uses a non-constant time comparison function when checking whether the provided and expected token are equal, potentially allowing attackers to use statistical methods to obtain a valid token.

CVE-2023-41935 jenkins vulnerability CVSS: 0 06 Sep 2023, 13:15 UTC

Jenkins Azure AD Plugin 396.v86ce29279947 and earlier, except 378.380.v545b_1154b_3fb_, uses a non-constant time comparison function when checking whether the provided and expected CSRF protection nonce are equal, potentially allowing attackers to use statistical methods to obtain a valid nonce.

CVE-2023-41934 jenkins vulnerability CVSS: 0 06 Sep 2023, 13:15 UTC

Jenkins Pipeline Maven Integration Plugin 1330.v18e473854496 and earlier does not properly mask (i.e., replace with asterisks) usernames of credentials specified in custom Maven settings in Pipeline build logs if "Treat username as secret" is checked.

CVE-2023-41933 jenkins vulnerability CVSS: 0 06 Sep 2023, 13:15 UTC

Jenkins Job Configuration History Plugin 1227.v7a_79fc4dc01f and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2023-41932 jenkins vulnerability CVSS: 0 06 Sep 2023, 13:15 UTC

Jenkins Job Configuration History Plugin 1227.v7a_79fc4dc01f and earlier does not restrict 'timestamp' query parameters in multiple endpoints, allowing attackers with to delete attacker-specified directories on the Jenkins controller file system as long as they contain a file called 'history.xml'.

CVE-2023-41931 jenkins vulnerability CVSS: 0 06 Sep 2023, 13:15 UTC

Jenkins Job Configuration History Plugin 1227.v7a_79fc4dc01f and earlier does not property sanitize or escape the timestamp value from history entries when rendering a history entry on the history view, resulting in a stored cross-site scripting (XSS) vulnerability.

CVE-2023-41930 jenkins vulnerability CVSS: 0 06 Sep 2023, 13:15 UTC

Jenkins Job Configuration History Plugin 1227.v7a_79fc4dc01f and earlier does not restrict the 'name' query parameter when rendering a history entry, allowing attackers to have Jenkins render a manipulated configuration history that was not created by the plugin.

CVE-2023-4303 jenkins vulnerability CVSS: 0 21 Aug 2023, 23:15 UTC

Jenkins Fortify Plugin 22.1.38 and earlier does not escape the error message for a form validation method, resulting in an HTML injection vulnerability.

CVE-2023-4302 jenkins vulnerability CVSS: 0 21 Aug 2023, 23:15 UTC

A missing permission check in Jenkins Fortify Plugin 22.1.38 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2023-4301 jenkins vulnerability CVSS: 0 21 Aug 2023, 23:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Fortify Plugin 22.1.38 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2023-40350 jenkins vulnerability CVSS: 0 16 Aug 2023, 15:15 UTC

Jenkins Docker Swarm Plugin 1.11 and earlier does not escape values returned from Docker before inserting them into the Docker Swarm Dashboard view, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control responses from Docker.

CVE-2023-40349 jenkins vulnerability CVSS: 0 16 Aug 2023, 15:15 UTC

Jenkins Gogs Plugin 1.0.15 and earlier improperly initializes an option to secure its webhook endpoint, allowing unauthenticated attackers to trigger builds of jobs.

CVE-2023-40348 jenkins vulnerability CVSS: 0 16 Aug 2023, 15:15 UTC

The webhook endpoint in Jenkins Gogs Plugin 1.0.15 and earlier provides unauthenticated attackers information about the existence of jobs in its output.

CVE-2023-40347 jenkins vulnerability CVSS: 0 16 Aug 2023, 15:15 UTC

Jenkins Maven Artifact ChoiceListProvider (Nexus) Plugin 1.14 and earlier does not set the appropriate context for credentials lookup, allowing attackers with Item/Configure permission to access and capture credentials they are not entitled to.

CVE-2023-40346 jenkins vulnerability CVSS: 0 16 Aug 2023, 15:15 UTC

Jenkins Shortcut Job Plugin 0.4 and earlier does not escape the shortcut redirection URL, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure shortcut jobs.

CVE-2023-40345 jenkins vulnerability CVSS: 0 16 Aug 2023, 15:15 UTC

Jenkins Delphix Plugin 3.0.2 and earlier does not set the appropriate context for credentials lookup, allowing attackers with Overall/Read permission to access and capture credentials they are not entitled to.

CVE-2023-40344 jenkins vulnerability CVSS: 0 16 Aug 2023, 15:15 UTC

A missing permission check in Jenkins Delphix Plugin 3.0.2 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVE-2023-40343 jenkins vulnerability CVSS: 0 16 Aug 2023, 15:15 UTC

Jenkins Tuleap Authentication Plugin 1.1.20 and earlier uses a non-constant time comparison function when validating an authentication token allowing attackers to use statistical methods to obtain a valid authentication token.

CVE-2023-40342 jenkins vulnerability CVSS: 0 16 Aug 2023, 15:15 UTC

Jenkins Flaky Test Handler Plugin 1.2.2 and earlier does not escape JUnit test contents when showing them on the Jenkins UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control JUnit report file contents.

CVE-2023-40341 jenkins vulnerability CVSS: 0 16 Aug 2023, 15:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Blue Ocean Plugin 1.27.5 and earlier allows attackers to connect to an attacker-specified URL, capturing GitHub credentials associated with an attacker-specified job.

CVE-2023-40340 jenkins vulnerability CVSS: 0 16 Aug 2023, 15:15 UTC

Jenkins NodeJS Plugin 1.6.0 and earlier does not properly mask (i.e., replace with asterisks) credentials specified in the Npm config file in Pipeline build logs.

CVE-2023-40339 jenkins vulnerability CVSS: 0 16 Aug 2023, 15:15 UTC

Jenkins Config File Provider Plugin 952.va_544a_6234b_46 and earlier does not mask (i.e., replace with asterisks) credentials specified in configuration files when they're written to the build log.

CVE-2023-40338 jenkins vulnerability CVSS: 0 16 Aug 2023, 15:15 UTC

Jenkins Folders Plugin 6.846.v23698686f0f6 and earlier displays an error message that includes an absolute path of a log file when attempting to access the Scan Organization Folder Log if no logs are available, exposing information about the Jenkins controller file system.

CVE-2023-40337 jenkins vulnerability CVSS: 0 16 Aug 2023, 15:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Folders Plugin 6.846.v23698686f0f6 and earlier allows attackers to copy a view inside a folder.

CVE-2023-40336 jenkins vulnerability CVSS: 0 16 Aug 2023, 15:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Folders Plugin 6.846.v23698686f0f6 and earlier allows attackers to copy folders.

CVE-2023-3442 jenkins vulnerability CVSS: 0 26 Jul 2023, 19:15 UTC

A missing authorization vulnerability exists in versions of the Jenkins Plug-in for ServiceNow DevOps prior to 1.38.1 that, if exploited successfully, could cause the unwanted exposure of sensitive information. To address this issue, apply the 1.38.1 version of the Jenkins plug-in for ServiceNow DevOps on your Jenkins server. No changes are required on your instances of the Now Platform.

CVE-2023-3414 jenkins vulnerability CVSS: 0 26 Jul 2023, 19:15 UTC

A cross-site request forgery vulnerability exists in versions of the Jenkins Plug-in for ServiceNow DevOps prior to 1.38.1 that, if exploited successfully, could cause the unwanted exposure of sensitive information. To address this issue, apply the 1.38.1 version of the Jenkins plug-in for ServiceNow DevOps on your Jenkins server. No changes are required on your instances of the Now Platform.

CVE-2023-39153 jenkins vulnerability CVSS: 0 26 Jul 2023, 14:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins GitLab Authentication Plugin 1.17.1 and earlier allows attackers to trick users into logging in to the attacker's account.

CVE-2023-39152 jenkins vulnerability CVSS: 0 26 Jul 2023, 14:15 UTC

Always-incorrect control flow implementation in Jenkins Gradle Plugin 2.8 may result in credentials not being masked (i.e., replaced with asterisks) in the build log in some circumstances.

CVE-2023-39151 jenkins vulnerability CVSS: 0 26 Jul 2023, 14:15 UTC

Jenkins 2.415 and earlier, LTS 2.401.2 and earlier does not sanitize or properly encode URLs in build logs when transforming them into hyperlinks, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control build log contents.

CVE-2023-37965 jenkins vulnerability CVSS: 0 12 Jul 2023, 16:15 UTC

A missing permission check in Jenkins ElasticBox CI Plugin 5.0.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2023-37964 jenkins vulnerability CVSS: 0 12 Jul 2023, 16:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins ElasticBox CI Plugin 5.0.1 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2023-37963 jenkins vulnerability CVSS: 0 12 Jul 2023, 16:15 UTC

A missing permission check in Jenkins Benchmark Evaluator Plugin 1.0.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL and to check for the existence of directories, `.csv`, and `.ycsb` files on the Jenkins controller file system.

CVE-2023-37962 jenkins vulnerability CVSS: 0 12 Jul 2023, 16:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Benchmark Evaluator Plugin 1.0.1 and earlier allows attackers to connect to an attacker-specified URL and to check for the existence of directories, `.csv`, and `.ycsb` files on the Jenkins controller file system.

CVE-2023-37961 jenkins vulnerability CVSS: 0 12 Jul 2023, 16:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Assembla Auth Plugin 1.14 and earlier allows attackers to trick users into logging in to the attacker's account.

CVE-2023-37960 jenkins vulnerability CVSS: 0 12 Jul 2023, 16:15 UTC

Jenkins MathWorks Polyspace Plugin 1.0.5 and earlier allows attackers with Item/Configure permission to send emails with arbitrary files from the Jenkins controller file systems.

CVE-2023-37959 jenkins vulnerability CVSS: 0 12 Jul 2023, 16:15 UTC

A missing permission check in Jenkins Sumologic Publisher Plugin 2.2.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL.

CVE-2023-37958 jenkins vulnerability CVSS: 0 12 Jul 2023, 16:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Sumologic Publisher Plugin 2.2.1 and earlier allows attackers to connect to an attacker-specified URL.

CVE-2023-37957 jenkins vulnerability CVSS: 0 12 Jul 2023, 16:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Pipeline restFul API Plugin 0.11 and earlier allows attackers to connect to an attacker-specified URL, capturing a newly generated JCLI token.

CVE-2023-37956 jenkins vulnerability CVSS: 0 12 Jul 2023, 16:15 UTC

A missing permission check in Jenkins Test Results Aggregator Plugin 1.2.13 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.

CVE-2023-37955 jenkins vulnerability CVSS: 0 12 Jul 2023, 16:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Test Results Aggregator Plugin 1.2.13 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials.

CVE-2023-37953 jenkins vulnerability CVSS: 0 12 Jul 2023, 16:15 UTC

A missing permission check in Jenkins mabl Plugin 0.0.46 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2023-37952 jenkins vulnerability CVSS: 0 12 Jul 2023, 16:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins mabl Plugin 0.0.46 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2023-37951 jenkins vulnerability CVSS: 0 12 Jul 2023, 16:15 UTC

Jenkins mabl Plugin 0.0.46 and earlier does not set the appropriate context for credentials lookup, allowing attackers with Item/Configure permission to access and capture credentials they are not entitled to.

CVE-2023-37950 jenkins vulnerability CVSS: 0 12 Jul 2023, 16:15 UTC

A missing permission check in Jenkins mabl Plugin 0.0.46 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVE-2023-37949 jenkins vulnerability CVSS: 0 12 Jul 2023, 16:15 UTC

A missing permission check in Jenkins Orka by MacStadium Plugin 1.33 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2023-37947 jenkins vulnerability CVSS: 0 12 Jul 2023, 16:15 UTC

Jenkins OpenShift Login Plugin 1.1.0.227.v27e08dfb_1a_20 and earlier improperly determines that a redirect URL after login is legitimately pointing to Jenkins, allowing attackers to perform phishing attacks.

CVE-2023-37946 jenkins vulnerability CVSS: 0 12 Jul 2023, 16:15 UTC

Jenkins OpenShift Login Plugin 1.1.0.227.v27e08dfb_1a_20 and earlier does not invalidate the previous session on login.

CVE-2023-37945 jenkins vulnerability CVSS: 0 12 Jul 2023, 16:15 UTC

A missing permission check in Jenkins SAML Single Sign On(SSO) Plugin 2.1.0 through 2.3.0 (both inclusive) allows attackers with Overall/Read permission to download a string representation of the current security realm.

CVE-2023-37944 jenkins vulnerability CVSS: 0 12 Jul 2023, 16:15 UTC

A missing permission check in Jenkins Datadog Plugin 5.4.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2023-37943 jenkins vulnerability CVSS: 0 12 Jul 2023, 16:15 UTC

Jenkins Active Directory Plugin 2.30 and earlier ignores the "Require TLS" and "StartTls" options and always performs the connection test to Active directory unencrypted, allowing attackers able to capture network traffic between the Jenkins controller and Active Directory servers to obtain Active Directory credentials.

CVE-2023-37942 jenkins vulnerability CVSS: 0 12 Jul 2023, 16:15 UTC

Jenkins External Monitor Job Type Plugin 206.v9a_94ff0b_4a_10 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2023-3315 jenkins vulnerability CVSS: 0 19 Jun 2023, 21:15 UTC

Missing permission checks in Jenkins Team Concert Plugin 2.4.1 and earlier allow attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.

CVE-2023-35149 jenkins vulnerability CVSS: 0 14 Jun 2023, 13:15 UTC

A missing permission check in Jenkins Digital.ai App Management Publisher Plugin 2.6 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL, capturing credentials stored in Jenkins.

CVE-2023-35148 jenkins vulnerability CVSS: 0 14 Jun 2023, 13:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Digital.ai App Management Publisher Plugin 2.6 and earlier allows attackers to connect to an attacker-specified URL, capturing credentials stored in Jenkins.

CVE-2023-35147 jenkins vulnerability CVSS: 0 14 Jun 2023, 13:15 UTC

Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not restrict the AWS SQS queue name path parameter in an HTTP endpoint, allowing attackers with Item/Read permission to obtain the contents of arbitrary files on the Jenkins controller file system.

CVE-2023-35146 jenkins vulnerability CVSS: 0 14 Jun 2023, 13:15 UTC

Jenkins Template Workflows Plugin 41.v32d86a_313b_4a and earlier does not escape names of jobs used as buildings blocks for Template Workflow Job, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create jobs.

CVE-2023-35145 jenkins vulnerability CVSS: 0 14 Jun 2023, 13:15 UTC

Jenkins Sonargraph Integration Plugin 5.0.1 and earlier does not escape the file path and the project name for the Log file field form validation, resulting in a stored cross-site scripting vulnerability exploitable by attackers with Item/Configure permission.

CVE-2023-35142 jenkins vulnerability CVSS: 0 14 Jun 2023, 13:15 UTC

Jenkins Checkmarx Plugin 2022.4.3 and earlier disables SSL/TLS validation for connections to the Checkmarx server by default.

CVE-2023-35141 jenkins vulnerability CVSS: 0 14 Jun 2023, 13:15 UTC

In Jenkins 2.399 and earlier, LTS 2.387.3 and earlier, POST requests are sent in order to load the list of context actions. If part of the URL includes insufficiently escaped user-provided values, a victim may be tricked into sending a POST request to an unexpected endpoint by opening a context menu.

CVE-2023-33006 jenkins vulnerability CVSS: 0 16 May 2023, 17:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins WSO2 Oauth Plugin 1.0 and earlier allows attackers to trick users into logging in to the attacker's account.

CVE-2023-33005 jenkins vulnerability CVSS: 0 16 May 2023, 17:15 UTC

Jenkins WSO2 Oauth Plugin 1.0 and earlier does not invalidate the previous session on login.

CVE-2023-33002 jenkins vulnerability CVSS: 0 16 May 2023, 17:15 UTC

Jenkins TestComplete support Plugin 2.8.1 and earlier does not escape the TestComplete project name, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2023-33001 jenkins vulnerability CVSS: 0 16 May 2023, 17:15 UTC

Jenkins HashiCorp Vault Plugin 360.v0a_1c04cf807d and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log when push mode for durable task logging is enabled.

CVE-2023-33000 jenkins vulnerability CVSS: 0 16 May 2023, 17:15 UTC

Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.149 and earlier does not mask credentials displayed on the configuration form, increasing the potential for attackers to observe and capture them.

CVE-2023-32999 jenkins vulnerability CVSS: 0 16 May 2023, 17:15 UTC

A missing permission check in Jenkins AppSpider Plugin 1.0.15 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL and send an HTTP POST request with a JSON payload consisting of attacker-specified credentials.

CVE-2023-32998 jenkins vulnerability CVSS: 0 16 May 2023, 17:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins AppSpider Plugin 1.0.15 and earlier allows attackers to connect to an attacker-specified URL and send an HTTP POST request with a JSON payload consisting of attacker-specified credentials.

CVE-2023-32997 jenkins vulnerability CVSS: 0 16 May 2023, 17:15 UTC

Jenkins CAS Plugin 1.6.2 and earlier does not invalidate the previous session on login.

CVE-2023-32995 jenkins vulnerability CVSS: 0 16 May 2023, 17:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins SAML Single Sign On(SSO) Plugin 2.0.0 and earlier allows attackers to send an HTTP POST request with JSON body containing attacker-specified content, to miniOrange's API for sending emails.

CVE-2023-32994 jenkins vulnerability CVSS: 0 16 May 2023, 17:15 UTC

Jenkins SAML Single Sign On(SSO) Plugin 2.1.0 and earlier unconditionally disables SSL/TLS certificate validation for connections to miniOrange or the configured IdP to retrieve SAML metadata, which could be abused using a man-in-the-middle attack to intercept these connections.

CVE-2023-32993 jenkins vulnerability CVSS: 0 16 May 2023, 17:15 UTC

Jenkins SAML Single Sign On(SSO) Plugin 2.0.2 and earlier does not perform hostname validation when connecting to miniOrange or the configured IdP to retrieve SAML metadata, which could be abused using a man-in-the-middle attack to intercept these connections.

CVE-2023-32992 jenkins vulnerability CVSS: 0 16 May 2023, 17:15 UTC

Missing permission checks in Jenkins SAML Single Sign On(SSO) Plugin 2.0.2 and earlier allow attackers with Overall/Read permission to send an HTTP request to an attacker-specified URL and parse the response as XML, or parse a local file on the Jenkins controller as XML.

CVE-2023-32991 jenkins vulnerability CVSS: 0 16 May 2023, 17:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins SAML Single Sign On(SSO) Plugin 2.0.2 and earlier allows attackers to send an HTTP request to an attacker-specified URL and parse the response as XML, or parse a local file on the Jenkins controller as XML.

CVE-2023-32990 jenkins vulnerability CVSS: 0 16 May 2023, 17:15 UTC

A missing permission check in Jenkins Azure VM Agents Plugin 852.v8d35f0960a_43 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified Azure Cloud server using attacker-specified credentials IDs obtained through another method.

CVE-2023-32989 jenkins vulnerability CVSS: 0 16 May 2023, 16:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Azure VM Agents Plugin 852.v8d35f0960a_43 and earlier allows attackers to connect to an attacker-specified Azure Cloud server using attacker-specified credentials IDs obtained through another method.

CVE-2023-32988 jenkins vulnerability CVSS: 0 16 May 2023, 16:15 UTC

A missing permission check in Jenkins Azure VM Agents Plugin 852.v8d35f0960a_43 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVE-2023-32987 jenkins vulnerability CVSS: 0 16 May 2023, 16:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Reverse Proxy Auth Plugin 1.7.4 and earlier allows attackers to connect to an attacker-specified LDAP server using attacker-specified credentials.

CVE-2023-32985 jenkins vulnerability CVSS: 0 16 May 2023, 16:15 UTC

Jenkins Sidebar Link Plugin 2.2.1 and earlier does not restrict the path of files in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.

CVE-2023-32984 jenkins vulnerability CVSS: 0 16 May 2023, 16:15 UTC

Jenkins TestNG Results Plugin 730.v4c5283037693 and earlier does not escape several values that are parsed from TestNG report files and displayed on the plugin's test information pages, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide a crafted TestNG report file.

CVE-2023-32983 jenkins vulnerability CVSS: 0 16 May 2023, 16:15 UTC

Jenkins Ansible Plugin 204.v8191fd551eb_f and earlier does not mask extra variables displayed on the configuration form, increasing the potential for attackers to observe and capture them.

CVE-2023-32982 jenkins vulnerability CVSS: 0 16 May 2023, 16:15 UTC

Jenkins Ansible Plugin 204.v8191fd551eb_f and earlier stores extra variables unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.

CVE-2023-32981 jenkins vulnerability CVSS: 0 16 May 2023, 16:15 UTC

An arbitrary file write vulnerability in Jenkins Pipeline Utility Steps Plugin 2.15.2 and earlier allows attackers able to provide crafted archives as parameters to create or replace arbitrary files on the agent file system with attacker-specified content.

CVE-2023-32980 jenkins vulnerability CVSS: 0 16 May 2023, 16:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Email Extension Plugin allows attackers to make another user stop watching an attacker-specified job.

CVE-2023-32979 jenkins vulnerability CVSS: 0 16 May 2023, 16:15 UTC

Jenkins Email Extension Plugin does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of files in the email-templates/ directory in the Jenkins home directory on the controller file system.

CVE-2023-30532 jenkins vulnerability CVSS: 0 12 Apr 2023, 18:15 UTC

A missing permission check in Jenkins TurboScript Plugin 1.3 and earlier allows attackers with Item/Read permission to trigger builds of jobs corresponding to the attacker-specified repository.

CVE-2023-30531 jenkins vulnerability CVSS: 0 12 Apr 2023, 18:15 UTC

Jenkins Consul KV Builder Plugin 2.0.13 and earlier does not mask the HashiCorp Consul ACL Token on the global configuration form, increasing the potential for attackers to observe and capture it.

CVE-2023-30530 jenkins vulnerability CVSS: 0 12 Apr 2023, 18:15 UTC

Jenkins Consul KV Builder Plugin 2.0.13 and earlier stores the HashiCorp Consul ACL Token unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.

CVE-2023-30529 jenkins vulnerability CVSS: 0 12 Apr 2023, 18:15 UTC

Jenkins Lucene-Search Plugin 387.v938a_ecb_f7fe9 and earlier does not require POST requests for an HTTP endpoint, allowing attackers to reindex the database.

CVE-2023-30528 jenkins vulnerability CVSS: 0 12 Apr 2023, 18:15 UTC

Jenkins WSO2 Oauth Plugin 1.0 and earlier does not mask the WSO2 Oauth client secret on the global configuration form, increasing the potential for attackers to observe and capture it.

CVE-2023-30527 jenkins vulnerability CVSS: 0 12 Apr 2023, 18:15 UTC

Jenkins WSO2 Oauth Plugin 1.0 and earlier stores the WSO2 Oauth client secret unencrypted in the global config.xml file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.

CVE-2023-30526 jenkins vulnerability CVSS: 0 12 Apr 2023, 18:15 UTC

A missing permission check in Jenkins Report Portal Plugin 0.5 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified bearer token authentication.

CVE-2023-30525 jenkins vulnerability CVSS: 0 12 Apr 2023, 18:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Report Portal Plugin 0.5 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified bearer token authentication.

CVE-2023-30524 jenkins vulnerability CVSS: 0 12 Apr 2023, 18:15 UTC

Jenkins Report Portal Plugin 0.5 and earlier does not mask ReportPortal access tokens displayed on the configuration form, increasing the potential for attackers to observe and capture them.

CVE-2023-30523 jenkins vulnerability CVSS: 0 12 Apr 2023, 18:15 UTC

Jenkins Report Portal Plugin 0.5 and earlier stores ReportPortal access tokens unencrypted in job config.xml files on the Jenkins controller as part of its configuration where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.

CVE-2023-30522 jenkins vulnerability CVSS: 0 12 Apr 2023, 18:15 UTC

A missing permission check in Jenkins Fogbugz Plugin 2.2.17 and earlier allows attackers with Item/Read permission to trigger builds of jobs specified in a 'jobname' request parameter.

CVE-2023-30521 jenkins vulnerability CVSS: 0 12 Apr 2023, 18:15 UTC

A missing permission check in Jenkins Assembla merge request builder Plugin 1.1.13 and earlier allows unauthenticated attackers to trigger builds of jobs corresponding to the attacker-specified repository.

CVE-2023-30520 jenkins vulnerability CVSS: 0 12 Apr 2023, 18:15 UTC

Jenkins Quay.io trigger Plugin 0.1 and earlier does not limit URL schemes for repository homepage URLs submitted via Quay.io trigger webhooks, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to submit crafted Quay.io trigger webhook payloads.

CVE-2023-30519 jenkins vulnerability CVSS: 0 12 Apr 2023, 18:15 UTC

A missing permission check in Jenkins Quay.io trigger Plugin 0.1 and earlier allows unauthenticated attackers to trigger builds of jobs corresponding to the attacker-specified repository.

CVE-2023-30518 jenkins vulnerability CVSS: 0 12 Apr 2023, 18:15 UTC

A missing permission check in Jenkins Thycotic Secret Server Plugin 1.0.2 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVE-2023-30517 jenkins vulnerability CVSS: 0 12 Apr 2023, 18:15 UTC

Jenkins NeuVector Vulnerability Scanner Plugin 1.22 and earlier unconditionally disables SSL/TLS certificate and hostname validation when connecting to a configured NeuVector Vulnerability Scanner server.

CVE-2023-30516 jenkins vulnerability CVSS: 0 12 Apr 2023, 18:15 UTC

Jenkins Image Tag Parameter Plugin 2.0 improperly introduces an option to opt out of SSL/TLS certificate validation when connecting to Docker registries, resulting in job configurations using Image Tag Parameters that were created before 2.0 having SSL/TLS certificate validation disabled by default.

CVE-2023-30515 jenkins vulnerability CVSS: 0 12 Apr 2023, 18:15 UTC

Jenkins Thycotic DevOps Secrets Vault Plugin 1.0.0 and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log when push mode for durable task logging is enabled.

CVE-2023-30514 jenkins vulnerability CVSS: 0 12 Apr 2023, 18:15 UTC

Jenkins Azure Key Vault Plugin 187.va_cd5fecd198a_ and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log when push mode for durable task logging is enabled.

CVE-2023-30513 jenkins vulnerability CVSS: 0 12 Apr 2023, 18:15 UTC

Jenkins Kubernetes Plugin 3909.v1f2c633e8590 and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log when push mode for durable task logging is enabled.

CVE-2023-28684 jenkins vulnerability CVSS: 0 02 Apr 2023, 21:15 UTC

Jenkins remote-jobs-view-plugin Plugin 0.0.3 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2023-28683 jenkins vulnerability CVSS: 0 02 Apr 2023, 21:15 UTC

Jenkins Phabricator Differential Plugin 2.1.5 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2023-28682 jenkins vulnerability CVSS: 0 02 Apr 2023, 21:15 UTC

Jenkins Performance Publisher Plugin 8.09 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2023-28681 jenkins vulnerability CVSS: 0 02 Apr 2023, 21:15 UTC

Jenkins Visual Studio Code Metrics Plugin 1.7 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2023-28680 jenkins vulnerability CVSS: 0 02 Apr 2023, 21:15 UTC

Jenkins Crap4J Plugin 0.9 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2023-28679 jenkins vulnerability CVSS: 0 02 Apr 2023, 21:15 UTC

Jenkins Mashup Portlets Plugin 1.1.2 and earlier provides the "Generic JS Portlet" feature that lets a user populate a portlet using a custom JavaScript expression, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by authenticated attackers with Overall/Read permission.

CVE-2023-28678 jenkins vulnerability CVSS: 0 02 Apr 2023, 21:15 UTC

Jenkins Cppcheck Plugin 1.26 and earlier does not escape file names from Cppcheck report files before showing them on the Jenkins UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control report file contents.

CVE-2023-28677 jenkins vulnerability CVSS: 0 02 Apr 2023, 21:15 UTC

Jenkins Convert To Pipeline Plugin 1.0 and earlier uses basic string concatenation to convert Freestyle projects' Build Environment, Build Steps, and Post-build Actions to the equivalent Pipeline step invocations, allowing attackers able to configure Freestyle projects to prepare a crafted configuration that injects Pipeline script code into the (unsandboxed) Pipeline resulting from a convertion by Jenkins Convert To Pipeline Plugin.

CVE-2023-28676 jenkins vulnerability CVSS: 0 02 Apr 2023, 21:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Convert To Pipeline Plugin 1.0 and earlier allows attackers to create a Pipeline based on a Freestyle project, potentially leading to remote code execution (RCE).

CVE-2023-28675 jenkins vulnerability CVSS: 0 02 Apr 2023, 21:15 UTC

A missing permission check in Jenkins OctoPerf Load Testing Plugin Plugin 4.5.2 and earlier allows attackers to connect to a previously configured Octoperf server using attacker-specified credentials.

CVE-2023-28674 jenkins vulnerability CVSS: 0 02 Apr 2023, 21:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins OctoPerf Load Testing Plugin Plugin 4.5.2 and earlier allows attackers to connect to a previously configured Octoperf server using attacker-specified credentials.

CVE-2023-28673 jenkins vulnerability CVSS: 0 02 Apr 2023, 21:15 UTC

A missing permission check in Jenkins OctoPerf Load Testing Plugin Plugin 4.5.2 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVE-2023-28672 jenkins vulnerability CVSS: 0 02 Apr 2023, 21:15 UTC

Jenkins OctoPerf Load Testing Plugin Plugin 4.5.1 and earlier does not perform a permission check in a connection test HTTP endpoint, allowing attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2023-28671 jenkins vulnerability CVSS: 0 02 Apr 2023, 21:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins OctoPerf Load Testing Plugin Plugin 4.5.0 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2023-28670 jenkins vulnerability CVSS: 0 02 Apr 2023, 21:15 UTC

Jenkins Pipeline Aggregator View Plugin 1.13 and earlier does not escape a variable representing the current view's URL in inline JavaScript, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by authenticated attackers with Overall/Read permission.

CVE-2023-28669 jenkins vulnerability CVSS: 0 02 Apr 2023, 21:15 UTC

Jenkins JaCoCo Plugin 3.3.2 and earlier does not escape class and method names shown on the UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control input files for the 'Record JaCoCo coverage report' post-build action.

CVE-2023-28668 jenkins vulnerability CVSS: 0 02 Apr 2023, 21:15 UTC

Jenkins Role-based Authorization Strategy Plugin 587.v2872c41fa_e51 and earlier grants permissions even after they've been disabled.

CVE-2023-28685 jenkins vulnerability CVSS: 0 22 Mar 2023, 06:15 UTC

Jenkins AbsInt a³ Plugin 1.1.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2023-27905 jenkins vulnerability CVSS: 0 10 Mar 2023, 21:15 UTC

Jenkins update-center2 3.13 and 3.14 renders the required Jenkins core version on plugin download index pages without sanitization, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide a plugin for hosting.

CVE-2023-27904 jenkins vulnerability CVSS: 0 10 Mar 2023, 21:15 UTC

Jenkins 2.393 and earlier, LTS 2.375.3 and earlier prints an error stack trace on agent-related pages when agent connections are broken, potentially revealing information about Jenkins configuration that is otherwise inaccessible to attackers.

CVE-2023-27903 jenkins vulnerability CVSS: 0 10 Mar 2023, 21:15 UTC

Jenkins 2.393 and earlier, LTS 2.375.3 and earlier creates a temporary file in the default temporary directory with the default permissions for newly created files when uploading a file parameter through the CLI, potentially allowing attackers with access to the Jenkins controller file system to read and write the file before it is used.

CVE-2023-27902 jenkins vulnerability CVSS: 0 10 Mar 2023, 21:15 UTC

Jenkins 2.393 and earlier, LTS 2.375.3 and earlier shows temporary directories related to job workspaces, which allows attackers with Item/Workspace permission to access their contents.

CVE-2023-27901 jenkins vulnerability CVSS: 0 10 Mar 2023, 21:15 UTC

Jenkins 2.393 and earlier, LTS 2.375.3 and earlier uses the Apache Commons FileUpload library without specifying limits for the number of request parts introduced in version 1.5 for CVE-2023-24998 in org.kohsuke.stapler.RequestImpl, allowing attackers to trigger a denial of service.

CVE-2023-27900 jenkins vulnerability CVSS: 0 10 Mar 2023, 21:15 UTC

Jenkins 2.393 and earlier, LTS 2.375.3 and earlier uses the Apache Commons FileUpload library without specifying limits for the number of request parts introduced in version 1.5 for CVE-2023-24998 in hudson.util.MultipartFormDataParser, allowing attackers to trigger a denial of service.

CVE-2023-27899 jenkins vulnerability CVSS: 0 10 Mar 2023, 21:15 UTC

Jenkins 2.393 and earlier, LTS 2.375.3 and earlier creates a temporary file in the default temporary directory with the default permissions for newly created files when uploading a plugin for installation, potentially allowing attackers with access to the Jenkins controller file system to read and write the file before it is used, potentially resulting in arbitrary code execution.

CVE-2023-27898 jenkins vulnerability CVSS: 0 10 Mar 2023, 21:15 UTC

Jenkins 2.270 through 2.393 (both inclusive), LTS 2.277.1 through 2.375.3 (both inclusive) does not escape the Jenkins version a plugin depends on when rendering the error message stating its incompatibility with the current version of Jenkins, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide plugins to the configured update sites and have this message shown by Jenkins instances.

CVE-2023-23850 jenkins vulnerability CVSS: 0 15 Feb 2023, 19:15 UTC

A missing permission check in Synopsys Jenkins Coverity Plugin 3.0.2 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVE-2023-23848 jenkins vulnerability CVSS: 0 15 Feb 2023, 19:15 UTC

Missing permission checks in Synopsys Jenkins Coverity Plugin 3.0.2 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2023-23847 jenkins vulnerability CVSS: 0 15 Feb 2023, 19:15 UTC

A cross-site request forgery (CSRF) vulnerability in Synopsys Jenkins Coverity Plugin 3.0.2 and earlier allows attackers to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2023-25768 jenkins vulnerability CVSS: 0 15 Feb 2023, 14:15 UTC

A missing permission check in Jenkins Azure Credentials Plugin 253.v887e0f9e898b and earlier allows attackers with Overall/Read permission to connect to an attacker-specified web server.

CVE-2023-25767 jenkins vulnerability CVSS: 0 15 Feb 2023, 14:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Azure Credentials Plugin 253.v887e0f9e898b and earlier allows attackers to connect to an attacker-specified web server.

CVE-2023-25766 jenkins vulnerability CVSS: 0 15 Feb 2023, 14:15 UTC

A missing permission check in Jenkins Azure Credentials Plugin 253.v887e0f9e898b and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVE-2023-25765 jenkins vulnerability CVSS: 0 15 Feb 2023, 14:15 UTC

In Jenkins Email Extension Plugin 2.93 and earlier, templates defined inside a folder were not subject to Script Security protection, allowing attackers able to define email templates in folders to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.

CVE-2023-25764 jenkins vulnerability CVSS: 0 15 Feb 2023, 14:15 UTC

Jenkins Email Extension Plugin 2.93 and earlier does not escape, sanitize, or sandbox rendered email template output or log output generated during template rendering, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create or change custom email templates.

CVE-2023-25763 jenkins vulnerability CVSS: 0 15 Feb 2023, 14:15 UTC

Jenkins Email Extension Plugin 2.93 and earlier does not escape various fields included in bundled email templates, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control affected fields.

CVE-2023-25762 jenkins vulnerability CVSS: 0 15 Feb 2023, 14:15 UTC

Jenkins Pipeline: Build Step Plugin 2.18 and earlier does not escape job names in a JavaScript expression used in the Pipeline Snippet Generator, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control job names.

CVE-2023-25761 jenkins vulnerability CVSS: 0 15 Feb 2023, 14:15 UTC

Jenkins JUnit Plugin 1166.va_436e268e972 and earlier does not escape test case class names in JavaScript expressions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control test case class names in the JUnit resources processed by the plugin.

CVE-2023-24459 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

A missing permission check in Jenkins BearyChat Plugin 3.0.2 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL.

CVE-2023-24458 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins BearyChat Plugin 3.0.2 and earlier allows attackers to connect to an attacker-specified URL.

CVE-2023-24457 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Keycloak Authentication Plugin 2.3.0 and earlier allows attackers to trick users into logging in to the attacker's account.

CVE-2023-24456 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

Jenkins Keycloak Authentication Plugin 2.3.0 and earlier does not invalidate the previous session on login.

CVE-2023-24455 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

Jenkins visualexpert Plugin 1.3 and earlier does not restrict the names of files in methods implementing form validation, allowing attackers with Item/Configure permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.

CVE-2023-24454 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

Jenkins TestQuality Updater Plugin 1.3 and earlier stores the TestQuality Updater password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.

CVE-2023-24453 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

A missing check in Jenkins TestQuality Updater Plugin 1.3 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified username and password.

CVE-2023-24452 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins TestQuality Updater Plugin 1.3 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified username and password.

CVE-2023-24451 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

A missing permission check in Jenkins Cisco Spark Notifier Plugin 1.1.1 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVE-2023-24450 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

Jenkins view-cloner Plugin 1.1 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.

CVE-2023-24449 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

Jenkins PWauth Security Realm Plugin 0.4 and earlier does not restrict the names of files in methods implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.

CVE-2023-24448 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

A missing permission check in Jenkins RabbitMQ Consumer Plugin 2.8 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified AMQP(S) URL using attacker-specified username and password.

CVE-2023-24447 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins RabbitMQ Consumer Plugin 2.8 and earlier allows attackers to connect to an attacker-specified AMQP(S) URL using attacker-specified username and password.

CVE-2023-24446 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins OpenID Plugin 2.4 and earlier allows attackers to trick users into logging in to the attacker's account.

CVE-2023-24445 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

Jenkins OpenID Plugin 2.4 and earlier improperly determines that a redirect URL after login is legitimately pointing to Jenkins.

CVE-2023-24444 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

Jenkins OpenID Plugin 2.4 and earlier does not invalidate the previous session on login.

CVE-2023-24443 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

Jenkins TestComplete support Plugin 2.8.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2023-24442 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

Jenkins GitHub Pull Request Coverage Status Plugin 2.2.0 and earlier stores the GitHub Personal Access Token, Sonar access token and Sonar password unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.

CVE-2023-24441 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

Jenkins MSTest Plugin 1.0.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2023-24440 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

Jenkins JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier transmits the private key in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.

CVE-2023-24439 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

Jenkins JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier stores the private keys unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.

CVE-2023-24438 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

A missing permission check in Jenkins JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2023-24437 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2023-24436 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

A missing permission check in Jenkins GitHub Pull Request Builder Plugin 1.42.2 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVE-2023-24435 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

A missing permission check in Jenkins GitHub Pull Request Builder Plugin 1.42.2 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2023-24434 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins GitHub Pull Request Builder Plugin 1.42.2 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2023-24433 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

Missing permission checks in Jenkins Orka by MacStadium Plugin 1.31 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2023-24432 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Orka by MacStadium Plugin 1.31 and earlier allows attackers to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2023-24431 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

A missing permission check in Jenkins Orka by MacStadium Plugin 1.31 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVE-2023-24430 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

Jenkins Semantic Versioning Plugin 1.14 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2023-24429 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

Jenkins Semantic Versioning Plugin 1.14 and earlier does not restrict execution of an controller/agent message to agents, and implements no limitations about the file path that can be parsed, allowing attackers able to control agent processes to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.

CVE-2023-24428 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Bitbucket OAuth Plugin 0.12 and earlier allows attackers to trick users into logging in to the attacker's account.

CVE-2023-24427 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

Jenkins Bitbucket OAuth Plugin 0.12 and earlier does not invalidate the previous session on login.

CVE-2023-24426 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

Jenkins Azure AD Plugin 303.va_91ef20ee49f and earlier does not invalidate the previous session on login.

CVE-2023-24425 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

Jenkins Kubernetes Credentials Provider Plugin 1.208.v128ee9800c04 and earlier does not set the appropriate context for Kubernetes credentials lookup, allowing attackers with Item/Configure permission to access and potentially capture Kubernetes credentials they are not entitled to.

CVE-2023-24424 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

Jenkins OpenId Connect Authentication Plugin 2.4 and earlier does not invalidate the previous session on login.

CVE-2023-24423 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Gerrit Trigger Plugin 2.38.0 and earlier allows attackers to rebuild previous builds triggered by Gerrit.

CVE-2023-24422 jenkins vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

A sandbox bypass vulnerability involving map constructors in Jenkins Script Security Plugin 1228.vd93135a_2fb_25 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.

CVE-2022-46688 jenkins vulnerability CVSS: 0 12 Dec 2022, 09:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Sonar Gerrit Plugin 377.v8f3808963dc5 and earlier allows attackers to have Jenkins connect to Gerrit servers (previously configured by Jenkins administrators) using attacker-specified credentials IDs obtained through another method, potentially capturing credentials stored in Jenkins.

CVE-2022-46686 jenkins vulnerability CVSS: 0 12 Dec 2022, 09:15 UTC

Jenkins Custom Build Properties Plugin 2.79.vc095ccc85094 and earlier does not escape property values and build display names on the Custom Build Properties and Build Summary pages, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to set or change these values.

CVE-2022-46684 jenkins vulnerability CVSS: 0 12 Dec 2022, 09:15 UTC

Jenkins Checkmarx Plugin 2022.3.3 and earlier does not escape values returned from the Checkmarx service API before inserting them into HTML reports, resulting in a stored cross-site scripting (XSS) vulnerability.

CVE-2022-46683 jenkins vulnerability CVSS: 0 12 Dec 2022, 09:15 UTC

Jenkins Google Login Plugin 1.4 through 1.6 (both inclusive) improperly determines that a redirect URL after login is legitimately pointing to Jenkins.

CVE-2022-46682 jenkins vulnerability CVSS: 0 12 Dec 2022, 09:15 UTC

Jenkins Plot Plugin 2.1.11 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2022-45401 jenkins vulnerability CVSS: 0 15 Nov 2022, 20:15 UTC

Jenkins Associated Files Plugin 0.2.1 and earlier does not escape names of associated files, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-45400 jenkins vulnerability CVSS: 0 15 Nov 2022, 20:15 UTC

Jenkins JAPEX Plugin 1.7 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2022-45399 jenkins vulnerability CVSS: 0 15 Nov 2022, 20:15 UTC

A missing permission check in Jenkins Cluster Statistics Plugin 0.4.6 and earlier allows attackers to delete recorded Jenkins Cluster Statistics.

CVE-2022-45398 jenkins vulnerability CVSS: 0 15 Nov 2022, 20:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Cluster Statistics Plugin 0.4.6 and earlier allows attackers to delete recorded Jenkins Cluster Statistics.

CVE-2022-45397 jenkins vulnerability CVSS: 0 15 Nov 2022, 20:15 UTC

Jenkins OSF Builder Suite : : XML Linter Plugin 1.0.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2022-45396 jenkins vulnerability CVSS: 0 15 Nov 2022, 20:15 UTC

Jenkins SourceMonitor Plugin 0.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2022-45395 jenkins vulnerability CVSS: 0 15 Nov 2022, 20:15 UTC

Jenkins CCCC Plugin 0.6 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2022-45394 jenkins vulnerability CVSS: 0 15 Nov 2022, 20:15 UTC

A missing permission check in Jenkins Delete log Plugin 1.0 and earlier allows attackers with Item/Read permission to delete build logs.

CVE-2022-45393 jenkins vulnerability CVSS: 0 15 Nov 2022, 20:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Delete log Plugin 1.0 and earlier allows attackers to delete build logs.

CVE-2022-45392 jenkins vulnerability CVSS: 0 15 Nov 2022, 20:15 UTC

Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.143 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by attackers with Extended Read permission, or access to the Jenkins controller file system.

CVE-2022-45391 jenkins vulnerability CVSS: 0 15 Nov 2022, 20:15 UTC

Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.143 and earlier globally and unconditionally disables SSL/TLS certificate and hostname validation for the entire Jenkins controller JVM.

CVE-2022-45390 jenkins vulnerability CVSS: 0 15 Nov 2022, 20:15 UTC

A missing permission check in Jenkins loader.io Plugin 1.0.1 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVE-2022-45389 jenkins vulnerability CVSS: 0 15 Nov 2022, 20:15 UTC

A missing permission check in Jenkins XP-Dev Plugin 1.0 and earlier allows unauthenticated attackers to trigger builds of jobs corresponding to an attacker-specified repository.

CVE-2022-45388 jenkins vulnerability CVSS: 0 15 Nov 2022, 20:15 UTC

Jenkins Config Rotator Plugin 2.0.1 and earlier does not restrict a file name query parameter in an HTTP endpoint, allowing unauthenticated attackers to read arbitrary files with '.xml' extension on the Jenkins controller file system.

CVE-2022-45387 jenkins vulnerability CVSS: 0 15 Nov 2022, 20:15 UTC

Jenkins BART Plugin 1.0.3 and earlier does not escape the parsed content of build logs before rendering it on the Jenkins UI, resulting in a stored cross-site scripting (XSS) vulnerability.

CVE-2022-45386 jenkins vulnerability CVSS: 0 15 Nov 2022, 20:15 UTC

Jenkins Violations Plugin 0.7.11 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2022-45385 jenkins vulnerability CVSS: 0 15 Nov 2022, 20:15 UTC

A missing permission check in Jenkins CloudBees Docker Hub/Registry Notification Plugin 2.6.2 and earlier allows unauthenticated attackers to trigger builds of jobs corresponding to the attacker-specified repository.

CVE-2022-45384 jenkins vulnerability CVSS: 0 15 Nov 2022, 20:15 UTC

Jenkins Reverse Proxy Auth Plugin 1.7.3 and earlier stores the LDAP manager password unencrypted in the global config.xml file on the Jenkins controller where it can be viewed by attackers with access to the Jenkins controller file system.

CVE-2022-45383 jenkins vulnerability CVSS: 0 15 Nov 2022, 20:15 UTC

An incorrect permission check in Jenkins Support Core Plugin 1206.v14049fa_b_d860 and earlier allows attackers with Support/DownloadBundle permission to download a previously created support bundle containing information limited to users with Overall/Administer permission.

CVE-2022-45382 jenkins vulnerability CVSS: 0 15 Nov 2022, 20:15 UTC

Jenkins Naginator Plugin 1.18.1 and earlier does not escape display names of source builds in builds that were triggered via Retry action, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to edit build display names.

CVE-2022-45381 jenkins vulnerability CVSS: 0 15 Nov 2022, 20:15 UTC

Jenkins Pipeline Utility Steps Plugin 2.13.1 and earlier does not restrict the set of enabled prefix interpolators and bundles versions of Apache Commons Configuration library that enable the 'file:' prefix interpolator by default, allowing attackers able to configure Pipelines to read arbitrary files from the Jenkins controller file system.

CVE-2022-45380 jenkins vulnerability CVSS: 0 15 Nov 2022, 20:15 UTC

Jenkins JUnit Plugin 1159.v0b_396e1e07dd and earlier converts HTTP(S) URLs in test report output to clickable links in an unsafe manner, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-45379 jenkins vulnerability CVSS: 0 15 Nov 2022, 20:15 UTC

Jenkins Script Security Plugin 1189.vb_a_b_7c8fd5fde and earlier stores whole-script approvals as the SHA-1 hash of the script, making it vulnerable to collision attacks.

CVE-2022-38666 jenkins vulnerability CVSS: 0 15 Nov 2022, 20:15 UTC

Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.146 and earlier unconditionally disables SSL/TLS certificate and hostname validation for several features.

CVE-2022-43435 jenkins vulnerability CVSS: 0 19 Oct 2022, 16:15 UTC

Jenkins 360 FireLine Plugin 1.7.2 and earlier programmatically disables Content-Security-Policy protection for user-generated content in workspaces, archived artifacts, etc. that Jenkins offers for download.

CVE-2022-43434 jenkins vulnerability CVSS: 0 19 Oct 2022, 16:15 UTC

Jenkins NeuVector Vulnerability Scanner Plugin 1.20 and earlier programmatically disables Content-Security-Policy protection for user-generated content in workspaces, archived artifacts, etc. that Jenkins offers for download.

CVE-2022-43430 jenkins vulnerability CVSS: 0 19 Oct 2022, 16:15 UTC

Jenkins Compuware Topaz for Total Test Plugin 2.4.8 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2022-43429 jenkins vulnerability CVSS: 0 19 Oct 2022, 16:15 UTC

Jenkins Compuware Topaz for Total Test Plugin 2.4.8 and earlier implements an agent/controller message that does not limit where it can be executed, allowing attackers able to control agent processes to read arbitrary files on the Jenkins controller file system.

CVE-2022-43428 jenkins vulnerability CVSS: 0 19 Oct 2022, 16:15 UTC

Jenkins Compuware Topaz for Total Test Plugin 2.4.8 and earlier implements an agent/controller message that does not limit where it can be executed, allowing attackers able to control agent processes to obtain the values of Java system properties from the Jenkins controller process.

CVE-2022-43427 jenkins vulnerability CVSS: 0 19 Oct 2022, 16:15 UTC

Jenkins Compuware Topaz for Total Test Plugin 2.4.8 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVE-2022-43426 jenkins vulnerability CVSS: 0 19 Oct 2022, 16:15 UTC

Jenkins S3 Explorer Plugin 1.0.8 and earlier does not mask the AWS_SECRET_ACCESS_KEY form field, increasing the potential for attackers to observe and capture it.

CVE-2022-43425 jenkins vulnerability CVSS: 0 19 Oct 2022, 16:15 UTC

Jenkins Custom Checkbox Parameter Plugin 1.4 and earlier does not escape the name and description of Custom Checkbox Parameter parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-43424 jenkins vulnerability CVSS: 0 19 Oct 2022, 16:15 UTC

Jenkins Compuware Xpediter Code Coverage Plugin 1.0.7 and earlier implements an agent/controller message that does not limit where it can be executed, allowing attackers able to control agent processes to obtain the values of Java system properties from the Jenkins controller process.

CVE-2022-43423 jenkins vulnerability CVSS: 0 19 Oct 2022, 16:15 UTC

Jenkins Compuware Source Code Download for Endevor, PDS, and ISPW Plugin 2.0.12 and earlier implements an agent/controller message that does not limit where it can be executed, allowing attackers able to control agent processes to obtain the values of Java system properties from the Jenkins controller process.

CVE-2022-43422 jenkins vulnerability CVSS: 0 19 Oct 2022, 16:15 UTC

Jenkins Compuware Topaz Utilities Plugin 1.0.8 and earlier implements an agent/controller message that does not limit where it can be executed, allowing attackers able to control agent processes to obtain the values of Java system properties from the Jenkins controller process.

CVE-2022-43421 jenkins vulnerability CVSS: 0 19 Oct 2022, 16:15 UTC

A missing permission check in Jenkins Tuleap Git Branch Source Plugin 3.2.4 and earlier allows unauthenticated attackers to trigger Tuleap projects whose configured repository matches the attacker-specified value.

CVE-2022-43420 jenkins vulnerability CVSS: 0 19 Oct 2022, 16:15 UTC

Jenkins Contrast Continuous Application Security Plugin 3.9 and earlier does not escape data returned from the Contrast service when generating a report, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control or modify Contrast service API responses.

CVE-2022-43419 jenkins vulnerability CVSS: 0 19 Oct 2022, 16:15 UTC

Jenkins Katalon Plugin 1.0.32 and earlier stores API keys unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.

CVE-2022-43418 jenkins vulnerability CVSS: 0 19 Oct 2022, 16:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Katalon Plugin 1.0.33 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2022-43417 jenkins vulnerability CVSS: 0 19 Oct 2022, 16:15 UTC

Jenkins Katalon Plugin 1.0.32 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2022-43416 jenkins vulnerability CVSS: 0 19 Oct 2022, 16:15 UTC

Jenkins Katalon Plugin 1.0.32 and earlier implements an agent/controller message that does not limit where it can be executed and allows invoking Katalon with configurable arguments, allowing attackers able to control agent processes to invoke Katalon on the Jenkins controller with attacker-controlled version, install location, and arguments, and attackers additionally able to create files on the Jenkins controller (e.g., attackers with Item/Configure permission could archive artifacts) to invoke arbitrary OS commands.

CVE-2022-43415 jenkins vulnerability CVSS: 0 19 Oct 2022, 16:15 UTC

Jenkins REPO Plugin 1.15.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2022-43414 jenkins vulnerability CVSS: 0 19 Oct 2022, 16:15 UTC

Jenkins NUnit Plugin 0.27 and earlier implements an agent-to-controller message that parses files inside a user-specified directory as test results, allowing attackers able to control agent processes to obtain test results from files in an attacker-specified directory on the Jenkins controller.

CVE-2022-43413 jenkins vulnerability CVSS: 0 19 Oct 2022, 16:15 UTC

Jenkins Job Import Plugin 3.5 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVE-2022-43412 jenkins vulnerability CVSS: 0 19 Oct 2022, 16:15 UTC

Jenkins Generic Webhook Trigger Plugin 1.84.1 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token.

CVE-2022-43411 jenkins vulnerability CVSS: 0 19 Oct 2022, 16:15 UTC

Jenkins GitLab Plugin 1.5.35 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token.

CVE-2022-43410 jenkins vulnerability CVSS: 0 19 Oct 2022, 16:15 UTC

Jenkins Mercurial Plugin 1251.va_b_121f184902 and earlier provides information about which jobs were triggered or scheduled for polling through its webhook endpoint, including jobs the user has no permission to access.

CVE-2022-43409 jenkins vulnerability CVSS: 0 19 Oct 2022, 16:15 UTC

Jenkins Pipeline: Supporting APIs Plugin 838.va_3a_087b_4055b and earlier does not sanitize or properly encode URLs of hyperlinks sending POST requests in build logs, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create Pipelines.

CVE-2022-43408 jenkins vulnerability CVSS: 0 19 Oct 2022, 16:15 UTC

Jenkins Pipeline: Stage View Plugin 2.26 and earlier does not correctly encode the ID of 'input' steps when using it to generate URLs to proceed or abort Pipeline builds, allowing attackers able to configure Pipelines to specify 'input' step IDs resulting in URLs that would bypass the CSRF protection of any target URL in Jenkins.

CVE-2022-43407 jenkins vulnerability CVSS: 0 19 Oct 2022, 16:15 UTC

Jenkins Pipeline: Input Step Plugin 451.vf1a_a_4f405289 and earlier does not restrict or sanitize the optionally specified ID of the 'input' step, which is used for the URLs that process user interactions for the given 'input' step (proceed or abort) and is not correctly encoded, allowing attackers able to configure Pipelines to have Jenkins build URLs from 'input' step IDs that would bypass the CSRF protection of any target URL in Jenkins when the 'input' step is interacted with.

CVE-2022-43404 jenkins vulnerability CVSS: 0 19 Oct 2022, 16:15 UTC

A sandbox bypass vulnerability involving crafted constructor bodies and calls to sandbox-generated synthetic constructors in Jenkins Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.

CVE-2022-43403 jenkins vulnerability CVSS: 0 19 Oct 2022, 16:15 UTC

A sandbox bypass vulnerability involving casting an array-like value to an array type in Jenkins Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.

CVE-2022-43402 jenkins vulnerability CVSS: 0 19 Oct 2022, 16:15 UTC

A sandbox bypass vulnerability involving various casts performed implicitly by the Groovy language runtime in Jenkins Pipeline: Groovy Plugin 2802.v5ea_628154b_c2 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.

CVE-2022-43401 jenkins vulnerability CVSS: 0 19 Oct 2022, 16:15 UTC

A sandbox bypass vulnerability involving various casts performed implicitly by the Groovy language runtime in Jenkins Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.

CVE-2022-41255 jenkins vulnerability CVSS: 0 21 Sep 2022, 16:15 UTC

Jenkins CONS3RT Plugin 1.0.0 and earlier stores Cons3rt API token unencrypted in job config.xml files on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.

CVE-2022-41254 jenkins vulnerability CVSS: 0 21 Sep 2022, 16:15 UTC

Missing permission checks in Jenkins CONS3RT Plugin 1.0.0 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2022-41253 jenkins vulnerability CVSS: 0 21 Sep 2022, 16:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins CONS3RT Plugin 1.0.0 and earlier allows attackers to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2022-41252 jenkins vulnerability CVSS: 0 21 Sep 2022, 16:15 UTC

Missing permission checks in Jenkins CONS3RT Plugin 1.0.0 and earlier allows users with Overall/Read permission to enumerate credentials ID of credentials stored in Jenkins.

CVE-2022-41251 jenkins vulnerability CVSS: 0 21 Sep 2022, 16:15 UTC

A missing permission check in Jenkins Apprenda Plugin 2.2.0 and earlier allows users with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVE-2022-41250 jenkins vulnerability CVSS: 0 21 Sep 2022, 16:15 UTC

A missing permission check in Jenkins SCM HttpClient Plugin 1.5 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2022-41249 jenkins vulnerability CVSS: 0 21 Sep 2022, 16:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins SCM HttpClient Plugin 1.5 and earlier allows attackers to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2022-41248 jenkins vulnerability CVSS: 0 21 Sep 2022, 16:15 UTC

Jenkins BigPanda Notifier Plugin 1.4.0 and earlier does not mask the BigPanda API key on the global configuration form, increasing the potential for attackers to observe and capture it.

CVE-2022-41247 jenkins vulnerability CVSS: 0 21 Sep 2022, 16:15 UTC

Jenkins BigPanda Notifier Plugin 1.4.0 and earlier stores the BigPanda API key unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.

CVE-2022-41246 jenkins vulnerability CVSS: 0 21 Sep 2022, 16:15 UTC

A missing permission check in Jenkins Worksoft Execution Manager Plugin 10.0.3.503 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2022-41245 jenkins vulnerability CVSS: 0 21 Sep 2022, 16:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Worksoft Execution Manager Plugin 10.0.3.503 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2022-41244 jenkins vulnerability CVSS: 0 21 Sep 2022, 16:15 UTC

Jenkins View26 Test-Reporting Plugin 1.0.7 and earlier does not perform hostname validation when connecting to the configured View26 server that could be abused using a man-in-the-middle attack to intercept these connections.

CVE-2022-41243 jenkins vulnerability CVSS: 0 21 Sep 2022, 16:15 UTC

Jenkins SmallTest Plugin 1.0.4 and earlier does not perform hostname validation when connecting to the configured View26 server that could be abused using a man-in-the-middle attack to intercept these connections.

CVE-2022-41242 jenkins vulnerability CVSS: 0 21 Sep 2022, 16:15 UTC

A missing permission check in Jenkins extreme-feedback Plugin 1.7 and earlier allows attackers with Overall/Read permission to discover information about job names attached to lamps, discover MAC and IP addresses of existing lamps, and rename lamps.

CVE-2022-41241 jenkins vulnerability CVSS: 0 21 Sep 2022, 16:15 UTC

Jenkins RQM Plugin 2.8 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2022-41240 jenkins vulnerability CVSS: 0 21 Sep 2022, 16:15 UTC

Jenkins Walti Plugin 1.0.1 and earlier does not escape the information provided by the Walti API, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide malicious API responses from Walti.

CVE-2022-41239 jenkins vulnerability CVSS: 0 21 Sep 2022, 16:15 UTC

Jenkins DotCi Plugin 2.40.00 and earlier does not escape the GitHub user name parameter provided to commit notifications when displaying them in a build cause, resulting in a stored cross-site scripting (XSS) vulnerability.

CVE-2022-41238 jenkins vulnerability CVSS: 0 21 Sep 2022, 16:15 UTC

A missing permission check in Jenkins DotCi Plugin 2.40.00 and earlier allows unauthenticated attackers to trigger builds of jobs corresponding to the attacker-specified repository for attacker-specified commits.

CVE-2022-41237 jenkins vulnerability CVSS: 0 21 Sep 2022, 16:15 UTC

Jenkins DotCi Plugin 2.40.00 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.

CVE-2022-41236 jenkins vulnerability CVSS: 0 21 Sep 2022, 16:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Security Inspector Plugin 117.v6eecc36919c2 and earlier allows attackers to replace the generated report stored in a per-session cache and displayed to authorized users at the .../report URL with a report based on attacker-specified report generation options.

CVE-2022-41235 jenkins vulnerability CVSS: 0 21 Sep 2022, 16:15 UTC

Jenkins WildFly Deployer Plugin 1.0.2 and earlier implements functionality that allows agent processes to read arbitrary files on the Jenkins controller file system.

CVE-2022-41234 jenkins vulnerability CVSS: 0 21 Sep 2022, 16:15 UTC

Jenkins Rundeck Plugin 3.6.11 and earlier does not protect access to the /plugin/rundeck/webhook/ endpoint, allowing users with Overall/Read permission to trigger jobs that are configured to be triggerable via Rundeck.

CVE-2022-41233 jenkins vulnerability CVSS: 0 21 Sep 2022, 16:15 UTC

Jenkins Rundeck Plugin 3.6.11 and earlier does not perform Run/Artifacts permission checks in multiple HTTP endpoints, allowing attackers with Item/Read permission to obtain information about build artifacts of a given job, if the optional Run/Artifacts permission is enabled.

CVE-2022-41232 jenkins vulnerability CVSS: 0 21 Sep 2022, 16:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Build-Publisher Plugin 1.22 and earlier allows attackers to replace any config.xml file on the Jenkins controller file system with an empty file by providing a crafted file name to an API endpoint.

CVE-2022-41231 jenkins vulnerability CVSS: 0 21 Sep 2022, 16:15 UTC

Jenkins Build-Publisher Plugin 1.22 and earlier allows attackers with Item/Configure permission to create or replace any config.xml file on the Jenkins controller file system by providing a crafted file name to an API endpoint.

CVE-2022-41230 jenkins vulnerability CVSS: 0 21 Sep 2022, 16:15 UTC

Jenkins Build-Publisher Plugin 1.22 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to obtain names and URLs of Jenkins servers that the plugin is configured to publish builds to, as well as builds pending for publication to those Jenkins servers.

CVE-2022-41229 jenkins vulnerability CVSS: 0 21 Sep 2022, 16:15 UTC

Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.134 and earlier does not escape configuration options of the Execute NetStorm/NetCloud Test build step, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-41228 jenkins vulnerability CVSS: 0 21 Sep 2022, 16:15 UTC

A missing permission check in Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.129 and earlier allows attackers with Overall/Read permissions to connect to an attacker-specified webserver using attacker-specified credentials.

CVE-2022-41227 jenkins vulnerability CVSS: 0 21 Sep 2022, 16:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.129 and earlier allows attackers to connect to an attacker-specified webserver using attacker-specified credentials.

CVE-2022-41226 jenkins vulnerability CVSS: 0 21 Sep 2022, 16:15 UTC

Jenkins Compuware Common Configuration Plugin 1.0.14 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2022-41225 jenkins vulnerability CVSS: 0 21 Sep 2022, 16:15 UTC

Jenkins Anchore Container Image Scanner Plugin 1.0.24 and earlier does not escape content provided by the Anchore engine API, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control API responses by Anchore engine.

CVE-2022-41224 jenkins vulnerability CVSS: 0 21 Sep 2022, 16:15 UTC

Jenkins 2.367 through 2.369 (both inclusive) does not escape tooltips of the l:helpIcon UI component used for some help icons on the Jenkins web UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control tooltips for this component.

CVE-2022-38665 jenkins vulnerability CVSS: 0 23 Aug 2022, 17:15 UTC

Jenkins CollabNet Plugins Plugin 2.0.8 and earlier stores a RabbitMQ password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.

CVE-2022-38664 jenkins vulnerability CVSS: 0 23 Aug 2022, 17:15 UTC

Jenkins Job Configuration History Plugin 1165.v8cc9fd1f4597 and earlier does not escape the job name on the System Configuration History page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure job names.

CVE-2022-38663 jenkins vulnerability CVSS: 0 23 Aug 2022, 17:15 UTC

Jenkins Git Plugin 4.11.4 and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log provided by the Git Username and Password (`gitUsernamePassword`) credentials binding.

CVE-2022-36922 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

Jenkins Lucene-Search Plugin 370.v62a5f618cd3a and earlier does not escape the search query parameter displayed on the 'search' result page, resulting in a reflected cross-site scripting (XSS) vulnerability.

CVE-2022-36921 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

A missing permission check in Jenkins Coverity Plugin 1.11.4 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2022-36920 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Coverity Plugin 1.11.4 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2022-36919 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

A missing permission check in Jenkins Coverity Plugin 1.11.4 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVE-2022-36918 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

Jenkins Buckminster Plugin 1.1.1 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.

CVE-2022-36917 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

A missing permission check in Jenkins Google Cloud Backup Plugin 0.6 and earlier allows attackers with Overall/Read permission to request a manual backup.

CVE-2022-36916 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Google Cloud Backup Plugin 0.6 and earlier allows attackers to request a manual backup.

CVE-2022-36915 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

Jenkins Android Signing Plugin 2.2.5 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Item/Read permission but without Item/Workspace or Item/Configure permission to check whether attacker-specified file patterns match workspace contents.

CVE-2022-36914 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

Jenkins Files Found Trigger Plugin 1.5 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.

CVE-2022-36913 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

Jenkins Openstack Heat Plugin 1.5 and earlier does not perform permission checks in methods implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.

CVE-2022-36912 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

A missing permission check in Jenkins Openstack Heat Plugin 1.5 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL.

CVE-2022-36911 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Openstack Heat Plugin 1.5 and earlier allows attackers to connect to an attacker-specified URL.

CVE-2022-36910 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

Jenkins Lucene-Search Plugin 370.v62a5f618cd3a and earlier does not perform a permission check in several HTTP endpoints, allowing attackers with Overall/Read permission to reindex the database and to obtain information about jobs otherwise inaccessible to them.

CVE-2022-36909 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

A missing permission check in Jenkins OpenShift Deployer Plugin 1.2.0 and earlier allows attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system and to upload a SSH key file from the Jenkins controller file system to an attacker-specified URL.

CVE-2022-36908 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins OpenShift Deployer Plugin 1.2.0 and earlier allows attackers to check for the existence of an attacker-specified file path on the Jenkins controller file system and to upload a SSH key file from the Jenkins controller file system to an attacker-specified URL.

CVE-2022-36907 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

A missing permission check in Jenkins OpenShift Deployer Plugin 1.2.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified username and password.

CVE-2022-36906 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins OpenShift Deployer Plugin 1.2.0 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified username and password.

CVE-2022-36905 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

Jenkins Maven Metadata Plugin for Jenkins CI server Plugin 2.2 and earlier does not perform URL validation for the Repository Base URL of List maven artifact versions parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-36904 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

Jenkins Repository Connector Plugin 2.2.0 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.

CVE-2022-36903 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

A missing permission check in Jenkins Repository Connector Plugin 2.2.0 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVE-2022-36902 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

Jenkins Dynamic Extended Choice Parameter Plugin 1.0.1 and earlier does not escape several fields of Moded Extended Choice parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-36901 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

Jenkins HTTP Request Plugin 1.15 and earlier stores HTTP Request passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.

CVE-2022-36900 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

Jenkins Compuware zAdviser API Plugin 1.0.3 and earlier does not restrict execution of a controller/agent message to agents, allowing attackers able to control agent processes to retrieve Java system properties.

CVE-2022-36899 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

Jenkins Compuware ISPW Operations Plugin 1.0.8 and earlier does not restrict execution of a controller/agent message to agents, allowing attackers able to control agent processes to retrieve Java system properties.

CVE-2022-36898 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

A missing permission check in Jenkins Compuware ISPW Operations Plugin 1.0.8 and earlier allows attackers with Overall/Read permission to enumerate hosts and ports of Compuware configurations and credentials IDs of credentials stored in Jenkins.

CVE-2022-36897 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

A missing permission check in Jenkins Compuware Xpediter Code Coverage Plugin 1.0.7 and earlier allows attackers with Overall/Read permission to enumerate hosts and ports of Compuware configurations and credentials IDs of credentials stored in Jenkins.

CVE-2022-36896 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

A missing permission check in Jenkins Compuware Source Code Download for Endevor, PDS, and ISPW Plugin 2.0.12 and earlier allows attackers with Overall/Read permission to enumerate hosts and ports of Compuware configurations and credentials IDs of credentials stored in Jenkins.

CVE-2022-36895 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

A missing permission check in Jenkins Compuware Topaz Utilities Plugin 1.0.8 and earlier allows attackers with Overall/Read permission to enumerate hosts and ports of Compuware configurations and credentials IDs of credentials stored in Jenkins.

CVE-2022-36894 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

An arbitrary file write vulnerability in Jenkins CLIF Performance Testing Plugin 64.vc0d66de1dfb_f and earlier allows attackers with Overall/Read permission to create or replace arbitrary files on the Jenkins controller file system with attacker-specified content.

CVE-2022-36893 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

Jenkins rpmsign-plugin Plugin 0.5.0 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Item/Read permission but without Item/Workspace or Item/Configure permission to check whether attacker-specified file patterns match workspace contents.

CVE-2022-36892 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

Jenkins rhnpush-plugin Plugin 0.5.1 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Item/Read permission but without Item/Workspace or Item/Configure permission to check whether attacker-specified file patterns match workspace contents.

CVE-2022-36891 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

A missing permission check in Jenkins Deployer Framework Plugin 85.v1d1888e8c021 and earlier allows attackers with Item/Read permission but without Deploy Now/Deploy permission to read deployment logs.

CVE-2022-36890 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

Jenkins Deployer Framework Plugin 85.v1d1888e8c021 and earlier does not restrict the name of files in methods implementing form validation, allowing attackers with Item/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.

CVE-2022-36889 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

Jenkins Deployer Framework Plugin 85.v1d1888e8c021 and earlier does not restrict the application path of the applications when configuring a deployment, allowing attackers with Item/Configure permission to upload arbitrary files from the Jenkins controller file system to the selected service.

CVE-2022-36888 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

A missing permission check in Jenkins HashiCorp Vault Plugin 354.vdb_858fd6b_f48 and earlier allows attackers with Overall/Read permission to obtain credentials stored in Vault with attacker-specified path and keys.

CVE-2022-36887 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Job Configuration History Plugin 1155.v28a_46a_cc06a_5 and earlier allows attackers to delete entries from job, agent, and system configuration history, or restore older versions of job, agent, and system configurations.

CVE-2022-36886 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins External Monitor Job Type Plugin 191.v363d0d1efdf8 and earlier allows attackers to create runs of an external job.

CVE-2022-36885 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

Jenkins GitHub Plugin 1.34.4 and earlier uses a non-constant time comparison function when checking whether the provided and computed webhook signatures are equal, allowing attackers to use statistical methods to obtain a valid webhook signature.

CVE-2022-36884 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

The webhook endpoint in Jenkins Git Plugin 4.11.3 and earlier provide unauthenticated attackers information about the existence of jobs configured to use an attacker-specified Git repository.

CVE-2022-36883 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

A missing permission check in Jenkins Git Plugin 4.11.3 and earlier allows unauthenticated attackers to trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit.

CVE-2022-36882 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Git Plugin 4.11.3 and earlier allows attackers to trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit.

CVE-2022-36881 jenkins vulnerability CVSS: 0 27 Jul 2022, 15:15 UTC

Jenkins Git client Plugin 3.11.0 and earlier does not perform SSH host key verification when connecting to Git repositories via SSH, enabling man-in-the-middle attacks.

CVE-2022-2048 jenkins vulnerability CVSS: 5.0 07 Jul 2022, 21:15 UTC

In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests.

CVE-2015-5298 jenkins vulnerability CVSS: 4.0 07 Jul 2022, 19:15 UTC

The Google Login Plugin (versions 1.0 and 1.1) allows malicious anonymous users to authenticate successfully against Jenkins instances that are supposed to be locked down to a particular Google Apps domain through client-side request modification.

CVE-2022-34818 jenkins vulnerability CVSS: 4.0 30 Jun 2022, 18:15 UTC

Jenkins Failed Job Deactivator Plugin 1.2.1 and earlier does not perform permission checks in several views and HTTP endpoints, allowing attackers with Overall/Read permission to disable jobs.

CVE-2022-34817 jenkins vulnerability CVSS: 4.3 30 Jun 2022, 18:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Failed Job Deactivator Plugin 1.2.1 and earlier allows attackers to disable jobs.

CVE-2022-34816 jenkins vulnerability CVSS: 4.0 30 Jun 2022, 18:15 UTC

Jenkins HPE Network Virtualization Plugin 1.0 stores passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.

CVE-2022-34815 jenkins vulnerability CVSS: 4.3 30 Jun 2022, 18:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Request Rename Or Delete Plugin 1.1.0 and earlier allows attackers to accept pending requests, thereby renaming or deleting jobs.

CVE-2022-34814 jenkins vulnerability CVSS: 4.0 30 Jun 2022, 18:15 UTC

Jenkins Request Rename Or Delete Plugin 1.1.0 and earlier does not correctly perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to view an administrative configuration page listing pending requests.

CVE-2022-34813 jenkins vulnerability CVSS: 4.0 30 Jun 2022, 18:15 UTC

A missing permission check in Jenkins XPath Configuration Viewer Plugin 1.1.1 and earlier allows attackers with Overall/Read permission to create and delete XPath expressions.

CVE-2022-34812 jenkins vulnerability CVSS: 4.3 30 Jun 2022, 18:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins XPath Configuration Viewer Plugin 1.1.1 and earlier allows attackers to create and delete XPath expressions.

CVE-2022-34811 jenkins vulnerability CVSS: 4.0 30 Jun 2022, 18:15 UTC

A missing permission check in Jenkins XPath Configuration Viewer Plugin 1.1.1 and earlier allows attackers with Overall/Read permission to access the XPath Configuration Viewer page.

CVE-2022-34810 jenkins vulnerability CVSS: 4.0 30 Jun 2022, 18:15 UTC

A missing check in Jenkins RQM Plugin 2.8 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVE-2022-34809 jenkins vulnerability CVSS: 4.0 30 Jun 2022, 18:15 UTC

Jenkins RQM Plugin 2.8 and earlier stores a password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.

CVE-2022-34808 jenkins vulnerability CVSS: 4.0 30 Jun 2022, 18:15 UTC

Jenkins Cisco Spark Plugin 1.1.1 and earlier stores bearer tokens unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.

CVE-2022-34807 jenkins vulnerability CVSS: 4.0 30 Jun 2022, 18:15 UTC

Jenkins Elasticsearch Query Plugin 1.2 and earlier stores a password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.

CVE-2022-34806 jenkins vulnerability CVSS: 4.0 30 Jun 2022, 18:15 UTC

Jenkins Jigomerge Plugin 0.9 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.

CVE-2022-34805 jenkins vulnerability CVSS: 4.0 30 Jun 2022, 18:15 UTC

Jenkins Skype notifier Plugin 1.1.0 and earlier stores a password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.

CVE-2022-34804 jenkins vulnerability CVSS: 4.0 30 Jun 2022, 18:15 UTC

Jenkins OpsGenie Plugin 1.9 and earlier transmits API keys in plain text as part of the global Jenkins configuration form and job configuration forms, potentially resulting in their exposure.

CVE-2022-34803 jenkins vulnerability CVSS: 4.0 30 Jun 2022, 18:15 UTC

Jenkins OpsGenie Plugin 1.9 and earlier stores API keys unencrypted in its global configuration file and in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission (config.xml), or access to the Jenkins controller file system.

CVE-2022-34802 jenkins vulnerability CVSS: 4.0 30 Jun 2022, 18:15 UTC

Jenkins RocketChat Notifier Plugin 1.5.2 and earlier stores the login password and webhook token unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.

CVE-2022-34801 jenkins vulnerability CVSS: 4.0 30 Jun 2022, 18:15 UTC

Jenkins Build Notifications Plugin 1.5.0 and earlier transmits tokens in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.

CVE-2022-34800 jenkins vulnerability CVSS: 4.0 30 Jun 2022, 18:15 UTC

Jenkins Build Notifications Plugin 1.5.0 and earlier stores tokens unencrypted in its global configuration files on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.

CVE-2022-34799 jenkins vulnerability CVSS: 4.0 30 Jun 2022, 18:15 UTC

Jenkins Deployment Dashboard Plugin 1.0.10 and earlier stores a password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.

CVE-2022-34798 jenkins vulnerability CVSS: 3.5 30 Jun 2022, 18:15 UTC

Jenkins Deployment Dashboard Plugin 1.0.10 and earlier does not perform a permission check in several HTTP endpoints, allowing attackers with Overall/Read permission to connect to an attacker-specified HTTP URL using attacker-specified credentials.

CVE-2022-34797 jenkins vulnerability CVSS: 4.3 30 Jun 2022, 18:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Deployment Dashboard Plugin 1.0.10 and earlier allows attackers to connect to an attacker-specified HTTP URL using attacker-specified credentials.

CVE-2022-34796 jenkins vulnerability CVSS: 4.0 30 Jun 2022, 18:15 UTC

A missing permission check in Jenkins Deployment Dashboard Plugin 1.0.10 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVE-2022-34795 jenkins vulnerability CVSS: 3.5 30 Jun 2022, 18:15 UTC

Jenkins Deployment Dashboard Plugin 1.0.10 and earlier does not escape environment names on its Deployment Dashboard view, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with View/Configure permission.

CVE-2022-34794 jenkins vulnerability CVSS: 4.0 30 Jun 2022, 18:15 UTC

Missing permission checks in Jenkins Recipe Plugin 1.2 and earlier allow attackers with Overall/Read permission to send an HTTP request to an attacker-specified URL and parse the response as XML.

CVE-2022-34793 jenkins vulnerability CVSS: 6.5 30 Jun 2022, 18:15 UTC

Jenkins Recipe Plugin 1.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2022-34792 jenkins vulnerability CVSS: 6.0 30 Jun 2022, 18:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Recipe Plugin 1.2 and earlier allows attackers to send an HTTP request to an attacker-specified URL and parse the response as XML.

CVE-2022-34791 jenkins vulnerability CVSS: 3.5 30 Jun 2022, 18:15 UTC

Jenkins Validating Email Parameter Plugin 1.10 and earlier does not escape the name and description of its parameter type, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-34790 jenkins vulnerability CVSS: 3.5 30 Jun 2022, 18:15 UTC

Jenkins eXtreme Feedback Panel Plugin 2.0.1 and earlier does not escape the job names used in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-34789 jenkins vulnerability CVSS: 4.3 30 Jun 2022, 18:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Matrix Reloaded Plugin 1.1.3 and earlier allows attackers to rebuild previous matrix builds.

CVE-2022-34788 jenkins vulnerability CVSS: 3.5 30 Jun 2022, 18:15 UTC

Jenkins Matrix Reloaded Plugin 1.1.3 and earlier does not escape the agent name in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Agent/Configure permission.

CVE-2022-34787 jenkins vulnerability CVSS: 3.5 30 Jun 2022, 18:15 UTC

Jenkins Project Inheritance Plugin 21.04.03 and earlier does not escape the reason a build is blocked in tooltips, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers able to control the reason a queue item is blocked.

CVE-2022-34786 jenkins vulnerability CVSS: 3.5 30 Jun 2022, 18:15 UTC

Jenkins Rich Text Publisher Plugin 1.4 and earlier does not escape the HTML message set by its post-build step, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure jobs.

CVE-2022-34785 jenkins vulnerability CVSS: 4.0 30 Jun 2022, 18:15 UTC

Jenkins build-metrics Plugin 1.3 and earlier does not perform permission checks in multiple HTTP endpoints, allowing attackers with Overall/Read permission to obtain information about jobs otherwise inaccessible to them.

CVE-2022-34784 jenkins vulnerability CVSS: 3.5 30 Jun 2022, 18:15 UTC

Jenkins build-metrics Plugin 1.3 does not escape the build description on one of its views, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Build/Update permission.

CVE-2022-34783 jenkins vulnerability CVSS: 3.5 30 Jun 2022, 18:15 UTC

Jenkins Plot Plugin 2.1.10 and earlier does not escape plot descriptions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-34782 jenkins vulnerability CVSS: 4.0 30 Jun 2022, 18:15 UTC

An incorrect permission check in Jenkins requests-plugin Plugin 2.2.16 and earlier allows attackers with Overall/Read permission to view the list of pending requests.

CVE-2022-34781 jenkins vulnerability CVSS: 4.0 30 Jun 2022, 18:15 UTC

Missing permission checks in Jenkins XebiaLabs XL Release Plugin 22.0.0 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2022-34780 jenkins vulnerability CVSS: 4.3 30 Jun 2022, 18:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins XebiaLabs XL Release Plugin 22.0.0 and earlier allows attackers to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2022-34779 jenkins vulnerability CVSS: 4.0 30 Jun 2022, 18:15 UTC

A missing permission check in Jenkins XebiaLabs XL Release Plugin 22.0.0 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVE-2022-34778 jenkins vulnerability CVSS: 3.5 30 Jun 2022, 18:15 UTC

Jenkins TestNG Results Plugin 554.va4a552116332 and earlier renders the unescaped test descriptions and exception messages provided in test results if certain job-level options are set, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers able to configure jobs or control test results.

CVE-2022-34777 jenkins vulnerability CVSS: 3.5 30 Jun 2022, 18:15 UTC

Jenkins GitLab Plugin 1.5.34 and earlier does not escape multiple fields inserted into the description of webhook-triggered builds, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-34213 jenkins vulnerability CVSS: 4.0 23 Jun 2022, 17:15 UTC

Jenkins Squash TM Publisher (Squash4Jenkins) Plugin 1.0.0 and earlier stores passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.

CVE-2022-34212 jenkins vulnerability CVSS: 3.5 23 Jun 2022, 17:15 UTC

A missing permission check in Jenkins vRealize Orchestrator Plugin 3.0 and earlier allows attackers with Overall/Read permission to send an HTTP POST request to an attacker-specified URL.

CVE-2022-34211 jenkins vulnerability CVSS: 4.3 23 Jun 2022, 17:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins vRealize Orchestrator Plugin 3.0 and earlier allows attackers to send an HTTP POST request to an attacker-specified URL.

CVE-2022-34210 jenkins vulnerability CVSS: 4.0 23 Jun 2022, 17:15 UTC

A missing permission check in Jenkins ThreadFix Plugin 1.5.4 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL.

CVE-2022-34209 jenkins vulnerability CVSS: 4.3 23 Jun 2022, 17:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins ThreadFix Plugin 1.5.4 and earlier allows attackers to connect to an attacker-specified URL.

CVE-2022-34208 jenkins vulnerability CVSS: 4.0 23 Jun 2022, 17:15 UTC

A missing permission check in Jenkins Beaker builder Plugin 1.10 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL.

CVE-2022-34207 jenkins vulnerability CVSS: 4.3 23 Jun 2022, 17:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Beaker builder Plugin 1.10 and earlier allows attackers to connect to an attacker-specified URL.

CVE-2022-34206 jenkins vulnerability CVSS: 4.0 23 Jun 2022, 17:15 UTC

A missing permission check in Jenkins Jianliao Notification Plugin 1.1 and earlier allows attackers with Overall/Read permission to send HTTP POST requests to an attacker-specified URL.

CVE-2022-34205 jenkins vulnerability CVSS: 4.3 23 Jun 2022, 17:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Jianliao Notification Plugin 1.1 and earlier allows attackers to send HTTP POST requests to an attacker-specified URL.

CVE-2022-34204 jenkins vulnerability CVSS: 4.0 23 Jun 2022, 17:15 UTC

A missing permission check in Jenkins EasyQA Plugin 1.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified HTTP server.

CVE-2022-34203 jenkins vulnerability CVSS: 6.8 23 Jun 2022, 17:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins EasyQA Plugin 1.0 and earlier allows attackers to connect to an attacker-specified HTTP server.

CVE-2022-34202 jenkins vulnerability CVSS: 4.0 23 Jun 2022, 17:15 UTC

Jenkins EasyQA Plugin 1.0 and earlier stores user passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.

CVE-2022-34201 jenkins vulnerability CVSS: 4.0 23 Jun 2022, 17:15 UTC

A missing permission check in Jenkins Convertigo Mobile Platform Plugin 1.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL.

CVE-2022-34200 jenkins vulnerability CVSS: 6.8 23 Jun 2022, 17:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Convertigo Mobile Platform Plugin 1.1 and earlier allows attackers to connect to an attacker-specified URL.

CVE-2022-34199 jenkins vulnerability CVSS: 4.0 23 Jun 2022, 17:15 UTC

Jenkins Convertigo Mobile Platform Plugin 1.1 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.

CVE-2022-34198 jenkins vulnerability CVSS: 3.5 23 Jun 2022, 17:15 UTC

Jenkins Stash Branch Parameter Plugin 0.3.0 and earlier does not escape the name and description of Stash Branch parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-34197 jenkins vulnerability CVSS: 3.5 23 Jun 2022, 17:15 UTC

Jenkins Sauce OnDemand Plugin 1.204 and earlier does not escape the name and description of Sauce Labs Browsers parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-34196 jenkins vulnerability CVSS: 3.5 23 Jun 2022, 17:15 UTC

Jenkins REST List Parameter Plugin 1.5.2 and earlier does not escape the name and description of REST list parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-34195 jenkins vulnerability CVSS: 3.5 23 Jun 2022, 17:15 UTC

Jenkins Repository Connector Plugin 2.2.0 and earlier does not escape the name and description of Maven Repository Artifact parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-34194 jenkins vulnerability CVSS: 3.5 23 Jun 2022, 17:15 UTC

Jenkins Readonly Parameter Plugin 1.0.0 and earlier does not escape the name and description of Readonly String and Readonly Text parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-34193 jenkins vulnerability CVSS: 3.5 23 Jun 2022, 17:15 UTC

Jenkins Package Version Plugin 1.0.1 and earlier does not escape the name of Package version parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-34192 jenkins vulnerability CVSS: 3.5 23 Jun 2022, 17:15 UTC

Jenkins ontrack Jenkins Plugin 4.0.0 and earlier does not escape the name of Ontrack: Multi Parameter choice, Ontrack: Parameter choice, and Ontrack: SingleParameter parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-34191 jenkins vulnerability CVSS: 3.5 23 Jun 2022, 17:15 UTC

Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.77 and earlier does not escape the name of NetStorm Test parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-34190 jenkins vulnerability CVSS: 3.5 23 Jun 2022, 17:15 UTC

Jenkins Maven Metadata Plugin for Jenkins CI server Plugin 2.1 and earlier does not escape the name and description of List maven artifact versions parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-34189 jenkins vulnerability CVSS: 3.5 23 Jun 2022, 17:15 UTC

Jenkins Image Tag Parameter Plugin 1.10 and earlier does not escape the name and description of Image Tag parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-34188 jenkins vulnerability CVSS: 3.5 23 Jun 2022, 17:15 UTC

Jenkins Hidden Parameter Plugin 0.0.4 and earlier does not escape the name and description of Hidden Parameter parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-34187 jenkins vulnerability CVSS: 3.5 23 Jun 2022, 17:15 UTC

Jenkins Filesystem List Parameter Plugin 0.0.7 and earlier does not escape the name and description of File system objects list parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-34186 jenkins vulnerability CVSS: 3.5 23 Jun 2022, 17:15 UTC

Jenkins Dynamic Extended Choice Parameter Plugin 1.0.1 and earlier does not escape the name and description of Moded Extended Choice parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-34185 jenkins vulnerability CVSS: 3.5 23 Jun 2022, 17:15 UTC

Jenkins Date Parameter Plugin 0.0.4 and earlier does not escape the name and description of Date parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-34184 jenkins vulnerability CVSS: 3.5 23 Jun 2022, 17:15 UTC

Jenkins CRX Content Package Deployer Plugin 1.9 and earlier does not escape the name and description of CRX Content Package Choice parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-34183 jenkins vulnerability CVSS: 3.5 23 Jun 2022, 17:15 UTC

Jenkins Agent Server Parameter Plugin 1.1 and earlier does not escape the name and description of Agent Server parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-34182 jenkins vulnerability CVSS: 4.3 23 Jun 2022, 17:15 UTC

Jenkins Nested View Plugin 1.20 through 1.25 (both inclusive) does not escape search parameters, resulting in a reflected cross-site scripting (XSS) vulnerability.

CVE-2022-34181 jenkins vulnerability CVSS: 6.4 23 Jun 2022, 17:15 UTC

Jenkins xUnit Plugin 3.0.8 and earlier implements an agent-to-controller message that creates a user-specified directory if it doesn't exist, and parsing files inside it as test results, allowing attackers able to control agent processes to create an arbitrary directory on the Jenkins controller or to obtain test results from existing files in an attacker-specified directory.

CVE-2022-34180 jenkins vulnerability CVSS: 5.0 23 Jun 2022, 17:15 UTC

Jenkins Embeddable Build Status Plugin 2.0.3 and earlier does not correctly perform the ViewStatus permission check in the HTTP endpoint it provides for "unprotected" status badge access, allowing attackers without any permissions to obtain the build status badge icon for any attacker-specified job and/or build.

CVE-2022-34179 jenkins vulnerability CVSS: 5.0 23 Jun 2022, 17:15 UTC

Jenkins Embeddable Build Status Plugin 2.0.3 and earlier allows specifying a `style` query parameter that is used to choose a different SVG image style without restricting possible values, resulting in a relative path traversal vulnerability that allows attackers without Overall/Read permission to specify paths to other SVG images on the Jenkins controller file system.

CVE-2022-34178 jenkins vulnerability CVSS: 4.3 23 Jun 2022, 17:15 UTC

Jenkins Embeddable Build Status Plugin 2.0.3 allows specifying a 'link' query parameter that build status badges will link to, without restricting possible values, resulting in a reflected cross-site scripting (XSS) vulnerability.

CVE-2022-34177 jenkins vulnerability CVSS: 5.0 23 Jun 2022, 17:15 UTC

Jenkins Pipeline: Input Step Plugin 448.v37cea_9a_10a_70 and earlier archives files uploaded for `file` parameters for Pipeline `input` steps on the controller as part of build metadata, using the parameter name without sanitization as a relative path inside a build-related directory, allowing attackers able to configure Pipelines to create or replace arbitrary files on the Jenkins controller file system with attacker-specified content.

CVE-2022-34176 jenkins vulnerability CVSS: 3.5 23 Jun 2022, 17:15 UTC

Jenkins JUnit Plugin 1119.va_a_5e9068da_d7 and earlier does not escape descriptions of test results, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Run/Update permission.

CVE-2022-34175 jenkins vulnerability CVSS: 5.0 23 Jun 2022, 17:15 UTC

Jenkins 2.335 through 2.355 (both inclusive) allows attackers in some cases to bypass a protection mechanism, thereby directly accessing some view fragments containing sensitive information, bypassing any permission checks in the corresponding view.

CVE-2022-34174 jenkins vulnerability CVSS: 5.0 23 Jun 2022, 17:15 UTC

In Jenkins 2.355 and earlier, LTS 2.332.3 and earlier, an observable timing discrepancy on the login form allows distinguishing between login attempts with an invalid username, and login attempts with a valid username and wrong password, when using the Jenkins user database security realm.

CVE-2022-34171 jenkins vulnerability CVSS: 4.3 23 Jun 2022, 17:15 UTC

In Jenkins 2.321 through 2.355 (both inclusive) and LTS 2.332.1 through LTS 2.332.3 (both inclusive) the HTML output generated for new symbol-based SVG icons includes the 'title' attribute of 'l:ionicon' (until Jenkins 2.334) and 'alt' attribute of 'l:icon' (since Jenkins 2.335) without further escaping, resulting in a cross-site scripting (XSS) vulnerability.

CVE-2022-34170 jenkins vulnerability CVSS: 4.3 23 Jun 2022, 17:15 UTC

In Jenkins 2.320 through 2.355 (both inclusive) and LTS 2.332.1 through LTS 2.332.3 (both inclusive) the help icon does not escape the feature name that is part of its tooltip, effectively undoing the fix for SECURITY-1955, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.

CVE-2022-30971 jenkins vulnerability CVSS: 6.5 17 May 2022, 15:15 UTC

Jenkins Storable Configs Plugin 1.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2022-30970 jenkins vulnerability CVSS: 3.5 17 May 2022, 15:15 UTC

Jenkins Autocomplete Parameter Plugin 1.1 and earlier references Dropdown Autocomplete parameter and Auto Complete String parameter names in an unsafe manner from Javascript embedded in view definitions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-30969 jenkins vulnerability CVSS: 6.8 17 May 2022, 15:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Autocomplete Parameter Plugin 1.1 and earlier allows attackers to execute arbitrary code without sandbox protection if the victim is an administrator.

CVE-2022-30968 jenkins vulnerability CVSS: 3.5 17 May 2022, 15:15 UTC

Jenkins vboxwrapper Plugin 1.3 and earlier does not escape the name and description of VBox node parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-30967 jenkins vulnerability CVSS: 3.5 17 May 2022, 15:15 UTC

Jenkins Selection tasks Plugin 1.0 and earlier does not escape the name and description of Script Selection task variable parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-30966 jenkins vulnerability CVSS: 3.5 17 May 2022, 15:15 UTC

Jenkins Random String Parameter Plugin 1.0 and earlier does not escape the name and description of Random String parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-30965 jenkins vulnerability CVSS: 3.5 17 May 2022, 15:15 UTC

Jenkins Promoted Builds (Simple) Plugin 1.9 and earlier does not escape the name and description of Promotion Level parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-30963 jenkins vulnerability CVSS: 3.5 17 May 2022, 15:15 UTC

Jenkins JDK Parameter Plugin 1.0 and earlier does not escape the name and description of JDK parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-30962 jenkins vulnerability CVSS: 3.5 17 May 2022, 15:15 UTC

Jenkins Global Variable String Parameter Plugin 1.2 and earlier does not escape the name and description of Global Variable String parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-30961 jenkins vulnerability CVSS: 3.5 17 May 2022, 15:15 UTC

Jenkins Autocomplete Parameter Plugin 1.1 and earlier does not escape the name of Dropdown Autocomplete and Auto Complete String parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-30960 jenkins vulnerability CVSS: 3.5 17 May 2022, 15:15 UTC

Jenkins Application Detector Plugin 1.0.8 and earlier does not escape the name of Chois Application Version parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-30959 jenkins vulnerability CVSS: 4.0 17 May 2022, 15:15 UTC

A missing permission check in Jenkins SSH Plugin 2.6.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2022-30958 jenkins vulnerability CVSS: 6.8 17 May 2022, 15:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins SSH Plugin 2.6.1 and earlier allows attackers to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2022-30957 jenkins vulnerability CVSS: 4.0 17 May 2022, 15:15 UTC

A missing permission check in Jenkins SSH Plugin 2.6.1 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVE-2022-30956 jenkins vulnerability CVSS: 3.5 17 May 2022, 15:15 UTC

Jenkins Rundeck Plugin 3.6.10 and earlier does not restrict URL schemes in Rundeck webhook submissions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to submit crafted Rundeck webhook payloads.

CVE-2022-30955 jenkins vulnerability CVSS: 4.0 17 May 2022, 15:15 UTC

Jenkins GitLab Plugin 1.5.31 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVE-2022-30954 jenkins vulnerability CVSS: 4.0 17 May 2022, 15:15 UTC

Jenkins Blue Ocean Plugin 1.25.3 and earlier does not perform a permission check in several HTTP endpoints, allowing attackers with Overall/Read permission to connect to an attacker-specified HTTP server.

CVE-2022-30953 jenkins vulnerability CVSS: 4.3 17 May 2022, 15:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Blue Ocean Plugin 1.25.3 and earlier allows attackers to connect to an attacker-specified HTTP server.

CVE-2022-30952 jenkins vulnerability CVSS: 4.0 17 May 2022, 15:15 UTC

Jenkins Pipeline SCM API for Blue Ocean Plugin 1.25.3 and earlier allows attackers with Job/Configure permission to access credentials with attacker-specified IDs stored in the private per-user credentials stores of any attacker-specified user in Jenkins.

CVE-2022-30951 jenkins vulnerability CVSS: 6.5 17 May 2022, 15:15 UTC

Jenkins WMI Windows Agents Plugin 1.8 and earlier includes the Windows Remote Command library does not implement access control, potentially allowing users to start processes even if they're not allowed to log in.

CVE-2022-30950 jenkins vulnerability CVSS: 6.5 17 May 2022, 15:15 UTC

Jenkins WMI Windows Agents Plugin 1.8 and earlier includes the Windows Remote Command library which has a buffer overflow vulnerability that may allow users able to connect to a named pipe to execute commands on the Windows agent machine.

CVE-2022-30949 jenkins vulnerability CVSS: 5.0 17 May 2022, 15:15 UTC

Jenkins REPO Plugin 1.14.0 and earlier allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller's file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents.

CVE-2022-30948 jenkins vulnerability CVSS: 5.0 17 May 2022, 15:15 UTC

Jenkins Mercurial Plugin 2.16 and earlier allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller's file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents.

CVE-2022-30947 jenkins vulnerability CVSS: 5.0 17 May 2022, 15:15 UTC

Jenkins Git Plugin 4.11.1 and earlier allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller's file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents.

CVE-2022-30946 jenkins vulnerability CVSS: 4.3 17 May 2022, 15:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Script Security Plugin 1158.v7c1b_73a_69a_08 and earlier allows attackers to have Jenkins send an HTTP request to an attacker-specified webserver.

CVE-2022-30945 jenkins vulnerability CVSS: 6.8 17 May 2022, 15:15 UTC

Jenkins Pipeline: Groovy Plugin 2689.v434009a_31b_f1 and earlier allows loading any Groovy source files on the classpath of Jenkins and Jenkins plugins in sandboxed pipelines.

CVE-2022-29052 jenkins vulnerability CVSS: 4.0 12 Apr 2022, 20:15 UTC

Jenkins Google Compute Engine Plugin 4.3.8 and earlier stores private keys unencrypted in cloud agent config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.

CVE-2022-29051 jenkins vulnerability CVSS: 4.0 12 Apr 2022, 20:15 UTC

Missing permission checks in Jenkins Publish Over FTP Plugin 1.16 and earlier allow attackers with Overall/Read permission to connect to an FTP server using attacker-specified credentials.

CVE-2022-29050 jenkins vulnerability CVSS: 6.8 12 Apr 2022, 20:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Publish Over FTP Plugin 1.16 and earlier allows attackers to connect to an FTP server using attacker-specified credentials.

CVE-2022-29049 jenkins vulnerability CVSS: 4.0 12 Apr 2022, 20:15 UTC

Jenkins promoted builds Plugin 873.v6149db_d64130 and earlier, except 3.10.1, does not validate the names of promotions defined in Job DSL, allowing attackers with Job/Configure permission to create a promotion with an unsafe name.

CVE-2022-29048 jenkins vulnerability CVSS: 4.3 12 Apr 2022, 20:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Subversion Plugin 2.15.3 and earlier allows attackers to connect to an attacker-specified URL.

CVE-2022-29047 jenkins vulnerability CVSS: 5.0 12 Apr 2022, 20:15 UTC

Jenkins Pipeline: Shared Groovy Libraries Plugin 564.ve62a_4eb_b_e039 and earlier, except 2.21.3, allows attackers able to submit pull requests (or equivalent), but not able to commit directly to the configured SCM, to effectively change the Pipeline behavior by changing the definition of a dynamically retrieved library in their pull request, even if the Pipeline is configured to not trust them.

CVE-2022-29046 jenkins vulnerability CVSS: 3.5 12 Apr 2022, 20:15 UTC

Jenkins Subversion Plugin 2.15.3 and earlier does not escape the name and description of List Subversion tags (and more) parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-29045 jenkins vulnerability CVSS: 3.5 12 Apr 2022, 20:15 UTC

Jenkins promoted builds Plugin 873.v6149db_d64130 and earlier, except 3.10.1, does not escape the name and description of Promoted Build parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-29044 jenkins vulnerability CVSS: 3.5 12 Apr 2022, 20:15 UTC

Jenkins Node and Label parameter Plugin 1.10.3 and earlier does not escape the name and description of Node and Label parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-29043 jenkins vulnerability CVSS: 3.5 12 Apr 2022, 20:15 UTC

Jenkins Mask Passwords Plugin 3.0 and earlier does not escape the name and description of Non-Stored Password parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-29042 jenkins vulnerability CVSS: 3.5 12 Apr 2022, 20:15 UTC

Jenkins Job Generator Plugin 1.22 and earlier does not escape the name and description of Generator Parameter and Generator Choice parameters on Job Generator jobs' Build With Parameters views, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-29041 jenkins vulnerability CVSS: 3.5 12 Apr 2022, 20:15 UTC

Jenkins Jira Plugin 3.7 and earlier, except 3.6.1, does not escape the name and description of Jira Issue and Jira Release Version parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-29040 jenkins vulnerability CVSS: 3.5 12 Apr 2022, 20:15 UTC

Jenkins Git Parameter Plugin 0.9.15 and earlier does not escape the name and description of Git parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-29039 jenkins vulnerability CVSS: 3.5 12 Apr 2022, 20:15 UTC

Jenkins Gerrit Trigger Plugin 2.35.2 and earlier does not escape the name and description of Base64 Encoded String parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-29038 jenkins vulnerability CVSS: 3.5 12 Apr 2022, 20:15 UTC

Jenkins Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier does not escape the name and description of Extended Choice parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-29037 jenkins vulnerability CVSS: 3.5 12 Apr 2022, 20:15 UTC

Jenkins CVS Plugin 2.19 and earlier does not escape the name and description of CVS Symbolic Name parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-29036 jenkins vulnerability CVSS: 3.5 12 Apr 2022, 20:15 UTC

Jenkins Credentials Plugin 1111.v35a_307992395 and earlier, except 1087.1089.v2f1b_9a_b_040e4, 1074.1076.v39c30cecb_0e2, and 2.6.1.1, does not escape the name and description of Credentials parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-28160 jenkins vulnerability CVSS: 4.0 29 Mar 2022, 13:15 UTC

Jenkins Tests Selector Plugin 1.3.3 and earlier allows users with Item/Configure permission to read arbitrary files on the Jenkins controller.

CVE-2022-28159 jenkins vulnerability CVSS: 3.5 29 Mar 2022, 13:15 UTC

Jenkins Tests Selector Plugin 1.3.3 and earlier does not escape the Properties File Path option for Choosing Tests parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-28158 jenkins vulnerability CVSS: 4.0 29 Mar 2022, 13:15 UTC

A missing permission check in Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVE-2022-28157 jenkins vulnerability CVSS: 4.0 29 Mar 2022, 13:15 UTC

Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier allows attackers with Item/Configure permission to upload arbitrary files from the Jenkins controller via FTP to an attacker-specified FTP server.

CVE-2022-28156 jenkins vulnerability CVSS: 4.0 29 Mar 2022, 13:15 UTC

Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier allows attackers with Item/Configure permission to copy arbitrary files and directories from the Jenkins controller to the agent workspace.

CVE-2022-28155 jenkins vulnerability CVSS: 5.5 29 Mar 2022, 13:15 UTC

Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2022-28154 jenkins vulnerability CVSS: 5.5 29 Mar 2022, 13:15 UTC

Jenkins Coverage/Complexity Scatter Plot Plugin 1.1.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2022-28153 jenkins vulnerability CVSS: 3.5 29 Mar 2022, 13:15 UTC

Jenkins SiteMonitor Plugin 0.6 and earlier does not escape URLs of sites to monitor in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-28152 jenkins vulnerability CVSS: 4.3 29 Mar 2022, 13:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Job and Node ownership Plugin 0.13.0 and earlier allows attackers to restore the default ownership of a job.

CVE-2022-28151 jenkins vulnerability CVSS: 4.0 29 Mar 2022, 13:15 UTC

A missing permission check in Jenkins Job and Node ownership Plugin 0.13.0 and earlier allows attackers with Item/Read permission to change the owners and item-specific permissions of a job.

CVE-2022-28150 jenkins vulnerability CVSS: 6.8 29 Mar 2022, 13:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Job and Node ownership Plugin 0.13.0 and earlier allows attackers to change the owners and item-specific permissions of a job.

CVE-2022-28149 jenkins vulnerability CVSS: 3.5 29 Mar 2022, 13:15 UTC

Jenkins Job and Node ownership Plugin 0.13.0 and earlier does not escape the names of the secondary owners, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-28148 jenkins vulnerability CVSS: 4.0 29 Mar 2022, 13:15 UTC

The file browser in Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier may interpret some paths to files as absolute on Windows, resulting in a path traversal vulnerability allowing attackers with Item/Read permission to obtain the contents of arbitrary files on Windows controllers.

CVE-2022-28147 jenkins vulnerability CVSS: 4.0 29 Mar 2022, 13:15 UTC

A missing permission check in Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier allows attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.

CVE-2022-28146 jenkins vulnerability CVSS: 4.0 29 Mar 2022, 13:15 UTC

Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier allows attackers with Item/Configure permission to read arbitrary files on the Jenkins controller by specifying an input folder on the Jenkins controller as a parameter to its build steps.

CVE-2022-28145 jenkins vulnerability CVSS: 3.5 29 Mar 2022, 13:15 UTC

Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier does not apply Content-Security-Policy headers to report files it serves, resulting in a stored cross-site scripting (XSS) exploitable by attackers with Item/Configure permission or otherwise able to control report contents.

CVE-2022-28144 jenkins vulnerability CVSS: 4.0 29 Mar 2022, 13:15 UTC

Jenkins Proxmox Plugin 0.7.0 and earlier does not perform a permission check in several HTTP endpoints, allowing attackers with Overall/Read permission to connect to an attacker-specified host using attacker-specified username and password (perform a connection test), disable SSL/TLS validation for the entire Jenkins controller JVM as part of the connection test (see CVE-2022-28142), and test a rollback with attacker-specified parameters.

CVE-2022-28143 jenkins vulnerability CVSS: 4.0 29 Mar 2022, 13:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Proxmox Plugin 0.7.0 and earlier allows attackers to connect to an attacker-specified host using attacker-specified username and password (perform a connection test), disable SSL/TLS validation for the entire Jenkins controller JVM as part of the connection test (see CVE-2022-28142), and test a rollback with attacker-specified parameters.

CVE-2022-28142 jenkins vulnerability CVSS: 4.3 29 Mar 2022, 13:15 UTC

Jenkins Proxmox Plugin 0.6.0 and earlier disables SSL/TLS certificate validation globally for the Jenkins controller JVM when configured to ignore SSL/TLS issues.

CVE-2022-28141 jenkins vulnerability CVSS: 4.0 29 Mar 2022, 13:15 UTC

Jenkins Proxmox Plugin 0.5.0 and earlier stores the Proxmox Datacenter password unencrypted in the global config.xml file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.

CVE-2022-28140 jenkins vulnerability CVSS: 5.5 29 Mar 2022, 13:15 UTC

Jenkins Flaky Test Handler Plugin 1.2.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2022-28139 jenkins vulnerability CVSS: 4.0 29 Mar 2022, 13:15 UTC

A missing permission check in Jenkins RocketChat Notifier Plugin 1.4.10 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.

CVE-2022-28138 jenkins vulnerability CVSS: 4.3 29 Mar 2022, 13:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins RocketChat Notifier Plugin 1.4.10 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credential.

CVE-2022-28137 jenkins vulnerability CVSS: 4.0 29 Mar 2022, 13:15 UTC

A missing permission check in Jenkins JiraTestResultReporter Plugin 165.v817928553942 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.

CVE-2022-28136 jenkins vulnerability CVSS: 6.8 29 Mar 2022, 13:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins JiraTestResultReporter Plugin 165.v817928553942 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials.

CVE-2022-28135 jenkins vulnerability CVSS: 4.0 29 Mar 2022, 13:15 UTC

Jenkins instant-messaging Plugin 1.41 and earlier stores passwords for group chats unencrypted in the global configuration file of plugins based on Jenkins instant-messaging Plugin on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.

CVE-2022-28134 jenkins vulnerability CVSS: 5.5 29 Mar 2022, 13:15 UTC

Jenkins Bitbucket Server Integration Plugin 3.1.0 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to create, view, and delete BitBucket Server consumers.

CVE-2022-28133 jenkins vulnerability CVSS: 3.5 29 Mar 2022, 13:15 UTC

Jenkins Bitbucket Server Integration Plugin 3.1.0 and earlier does not limit URL schemes for callback URLs on OAuth consumers, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create BitBucket Server consumers.

CVE-2022-27218 jenkins vulnerability CVSS: 4.0 15 Mar 2022, 17:15 UTC

Jenkins incapptic connect uploader Plugin 1.15 and earlier stores tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.

CVE-2022-27216 jenkins vulnerability CVSS: 4.0 15 Mar 2022, 17:15 UTC

Jenkins dbCharts Plugin 0.5.2 and earlier stores JDBC connection passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.

CVE-2022-27215 jenkins vulnerability CVSS: 4.0 15 Mar 2022, 17:15 UTC

A missing permission check in Jenkins Release Helper Plugin 1.3.3 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.

CVE-2022-27214 jenkins vulnerability CVSS: 4.0 15 Mar 2022, 17:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Release Helper Plugin 1.3.3 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials.

CVE-2022-27213 jenkins vulnerability CVSS: 3.5 15 Mar 2022, 17:15 UTC

Jenkins Environment Dashboard Plugin 1.1.10 and earlier does not escape the Environment order and the Component order configuration values in its views, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with View/Configure permission.

CVE-2022-27212 jenkins vulnerability CVSS: 3.5 15 Mar 2022, 17:15 UTC

Jenkins List Git Branches Parameter Plugin 0.0.9 and earlier does not escape the name of the 'List Git branches (and more)' parameter, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-27211 jenkins vulnerability CVSS: 4.0 15 Mar 2022, 17:15 UTC

A missing permission check in Jenkins Kubernetes Continuous Deploy Plugin 2.3.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2022-27210 jenkins vulnerability CVSS: 4.3 15 Mar 2022, 17:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Kubernetes Continuous Deploy Plugin 2.3.1 and earlier allows attackers to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2022-27209 jenkins vulnerability CVSS: 4.0 15 Mar 2022, 17:15 UTC

A missing permission check in Jenkins Kubernetes Continuous Deploy Plugin 2.3.1 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVE-2022-27208 jenkins vulnerability CVSS: 4.0 15 Mar 2022, 17:15 UTC

Jenkins Kubernetes Continuous Deploy Plugin 2.3.1 and earlier allows users with Credentials/Create permission to read arbitrary files on the Jenkins controller.

CVE-2022-27207 jenkins vulnerability CVSS: 3.5 15 Mar 2022, 17:15 UTC

Jenkins global-build-stats Plugin 1.5 and earlier does not escape multiple fields in the chart configuration on the 'Global Build Stats' page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission.

CVE-2022-27206 jenkins vulnerability CVSS: 4.0 15 Mar 2022, 17:15 UTC

Jenkins GitLab Authentication Plugin 1.13 and earlier stores the GitLab client secret unencrypted in the global config.xml file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.

CVE-2022-27205 jenkins vulnerability CVSS: 4.0 15 Mar 2022, 17:15 UTC

A missing permission check in Jenkins Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL.

CVE-2022-27204 jenkins vulnerability CVSS: 6.8 15 Mar 2022, 17:15 UTC

A cross-site request forgery vulnerability in Jenkins Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier allows attackers to connect to an attacker-specified URL.

CVE-2022-27203 jenkins vulnerability CVSS: 4.0 15 Mar 2022, 17:15 UTC

Jenkins Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier allows attackers with Item/Configure permission to read values from arbitrary JSON and Java properties files on the Jenkins controller.

CVE-2022-27202 jenkins vulnerability CVSS: 3.5 15 Mar 2022, 17:15 UTC

Jenkins Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier does not escape the value and description of extended choice parameters of radio buttons or check boxes type, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-27201 jenkins vulnerability CVSS: 4.0 15 Mar 2022, 17:15 UTC

Jenkins Semantic Versioning Plugin 1.13 and earlier does not restrict execution of an controller/agent message to agents, and implements no limitations about the file path that can be parsed, allowing attackers able to control agent processes to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.

CVE-2022-27200 jenkins vulnerability CVSS: 3.5 15 Mar 2022, 17:15 UTC

Jenkins Folder-based Authorization Strategy Plugin 1.3 and earlier does not escape the names of roles shown on the configuration form, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission.

CVE-2022-27199 jenkins vulnerability CVSS: 4.0 15 Mar 2022, 17:15 UTC

A missing permission check in Jenkins CloudBees AWS Credentials Plugin 189.v3551d5642995 and earlier allows attackers with Overall/Read permission to connect to an AWS service using an attacker-specified token.

CVE-2022-27198 jenkins vulnerability CVSS: 6.0 15 Mar 2022, 17:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins CloudBees AWS Credentials Plugin 189.v3551d5642995 and earlier allows attackers with Overall/Read permission to connect to an AWS service using an attacker-specified token.

CVE-2022-27197 jenkins vulnerability CVSS: 3.5 15 Mar 2022, 17:15 UTC

Jenkins Dashboard View Plugin 2.18 and earlier does not perform URL validation for the Iframe Portlet's Iframe source URL, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure views.

CVE-2022-27196 jenkins vulnerability CVSS: 3.5 15 Mar 2022, 17:15 UTC

Jenkins Favorite Plugin 2.4.0 and earlier does not escape the names of jobs in the favorite column, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure or Item/Create permissions.

CVE-2022-27195 jenkins vulnerability CVSS: 2.1 15 Mar 2022, 17:15 UTC

Jenkins Parameterized Trigger Plugin 2.43 and earlier captures environment variables passed to builds triggered using Jenkins Parameterized Trigger Plugin, including password parameter values, in their `build.xml` files. These values are stored unencrypted and can be viewed by users with access to the Jenkins controller file system.

CVE-2022-25212 jenkins vulnerability CVSS: 6.8 15 Feb 2022, 17:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins SWAMP Plugin 1.2.6 and earlier allows attackers to connect to an attacker-specified web server using attacker-specified credentials.

CVE-2022-25211 jenkins vulnerability CVSS: 6.5 15 Feb 2022, 17:15 UTC

A missing permission check in Jenkins SWAMP Plugin 1.2.6 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified web server using attacker-specified credentials.

CVE-2022-25210 jenkins vulnerability CVSS: 4.0 15 Feb 2022, 17:15 UTC

Jenkins Convertigo Mobile Platform Plugin 1.1 and earlier uses static fields to store job configuration information, allowing attackers with Item/Configure permission to capture passwords of the jobs that will be configured.

CVE-2022-25209 jenkins vulnerability CVSS: 6.5 15 Feb 2022, 17:15 UTC

Jenkins Chef Sinatra Plugin 1.20 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2022-25208 jenkins vulnerability CVSS: 6.5 15 Feb 2022, 17:15 UTC

A missing permission check in Jenkins Chef Sinatra Plugin 1.20 and earlier allows attackers with Overall/Read permission to have Jenkins send an HTTP request to an attacker-controlled URL and have it parse an XML response.

CVE-2022-25207 jenkins vulnerability CVSS: 6.8 15 Feb 2022, 17:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Chef Sinatra Plugin 1.20 and earlier allows attackers to have Jenkins send an HTTP request to an attacker-controlled URL and have it parse an XML response.

CVE-2022-25206 jenkins vulnerability CVSS: 6.5 15 Feb 2022, 17:15 UTC

A missing check in Jenkins dbCharts Plugin 0.5.2 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified database via JDBC using attacker-specified credentials.

CVE-2022-25205 jenkins vulnerability CVSS: 6.8 15 Feb 2022, 17:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins dbCharts Plugin 0.5.2 and earlier allows attackers to connect to an attacker-specified database via JDBC using attacker-specified credentials and to determine if a class is available in the Jenkins instance.

CVE-2022-25204 jenkins vulnerability CVSS: 5.5 15 Feb 2022, 17:15 UTC

Jenkins Doktor Plugin 0.4.1 and earlier implements functionality that allows agent processes to render files on the controller as Markdown or Asciidoc, and error messages allow attackers able to control agent processes to determine whether a file with a given name exists.

CVE-2022-25203 jenkins vulnerability CVSS: 3.5 15 Feb 2022, 17:15 UTC

Jenkins Team Views Plugin 0.9.0 and earlier does not escape team names, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Read permission.

CVE-2022-25202 jenkins vulnerability CVSS: 3.5 15 Feb 2022, 17:15 UTC

Jenkins Promoted Builds (Simple) Plugin 1.9 and earlier does not escape the name of custom promotion levels, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission.

CVE-2022-25201 jenkins vulnerability CVSS: 4.0 15 Feb 2022, 17:15 UTC

Missing permission checks in Jenkins Checkmarx Plugin 2022.1.2 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified webserver using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2022-25200 jenkins vulnerability CVSS: 6.8 15 Feb 2022, 17:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Checkmarx Plugin 2022.1.2 and earlier allows attackers to connect to an attacker-specified webserver using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2022-25199 jenkins vulnerability CVSS: 6.5 15 Feb 2022, 17:15 UTC

A missing permission check in Jenkins SCP publisher Plugin 1.8 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified credentials.

CVE-2022-25198 jenkins vulnerability CVSS: 6.8 15 Feb 2022, 17:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins SCP publisher Plugin 1.8 and earlier allows attackers to connect to an attacker-specified SSH server using attacker-specified credentials.

CVE-2022-25197 jenkins vulnerability CVSS: 4.0 15 Feb 2022, 17:15 UTC

Jenkins HashiCorp Vault Plugin 336.v182c0fbaaeb7 and earlier implements functionality that allows agent processes to read arbitrary files on the Jenkins controller file system.

CVE-2022-25196 jenkins vulnerability CVSS: 4.9 15 Feb 2022, 17:15 UTC

Jenkins GitLab Authentication Plugin 1.13 and earlier records the HTTP Referer header as part of the URL query parameters when the authentication process starts, allowing attackers with access to Jenkins to craft a URL that will redirect users to an attacker-specified URL after logging in.

CVE-2022-25195 jenkins vulnerability CVSS: 4.0 15 Feb 2022, 17:15 UTC

A missing permission check in Jenkins autonomiq Plugin 1.15 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.

CVE-2022-25194 jenkins vulnerability CVSS: 6.8 15 Feb 2022, 17:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins autonomiq Plugin 1.15 and earlier allows attackers to connect to an attacker-specified URL server using attacker-specified credentials.

CVE-2022-25193 jenkins vulnerability CVSS: 4.0 15 Feb 2022, 17:15 UTC

Missing permission checks in Jenkins Snow Commander Plugin 1.10 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified webserver using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2022-25192 jenkins vulnerability CVSS: 6.8 15 Feb 2022, 17:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Snow Commander Plugin 1.10 and earlier allows attackers to connect to an attacker-specified webserver using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2022-25191 jenkins vulnerability CVSS: 3.5 15 Feb 2022, 17:15 UTC

Jenkins Agent Server Parameter Plugin 1.0 and earlier does not escape parameter names of agent server parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-25190 jenkins vulnerability CVSS: 4.0 15 Feb 2022, 17:15 UTC

A missing permission check in Jenkins Conjur Secrets Plugin 1.0.11 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVE-2022-25189 jenkins vulnerability CVSS: 3.5 15 Feb 2022, 17:15 UTC

Jenkins Custom Checkbox Parameter Plugin 1.1 and earlier does not escape parameter names of custom checkbox parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-25188 jenkins vulnerability CVSS: 4.0 15 Feb 2022, 17:15 UTC

Jenkins Fortify Plugin 20.2.34 and earlier does not sanitize the appName and appVersion parameters of its Pipeline steps, allowing attackers with Item/Configure permission to write or overwrite .xml files on the Jenkins controller file system with content not controllable by the attacker.

CVE-2022-25187 jenkins vulnerability CVSS: 4.0 15 Feb 2022, 17:15 UTC

Jenkins Support Core Plugin 2.79 and earlier does not redact some sensitive information in the support bundle.

CVE-2022-25186 jenkins vulnerability CVSS: 4.0 15 Feb 2022, 17:15 UTC

Jenkins HashiCorp Vault Plugin 3.8.0 and earlier implements functionality that allows agent processes to retrieve any Vault secrets for use on the agent, allowing attackers able to control agent processes to obtain Vault secrets for an attacker-specified path and key.

CVE-2022-25185 jenkins vulnerability CVSS: 3.5 15 Feb 2022, 17:15 UTC

Jenkins Generic Webhook Trigger Plugin 1.81 and earlier does not escape the build cause when using the webhook, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-25184 jenkins vulnerability CVSS: 4.0 15 Feb 2022, 17:15 UTC

Jenkins Pipeline: Build Step Plugin 2.15 and earlier reveals password parameter default values when generating a pipeline script using the Pipeline Snippet Generator, allowing attackers with Item/Read permission to retrieve the default password parameter value from jobs.

CVE-2022-25183 jenkins vulnerability CVSS: 6.5 15 Feb 2022, 17:15 UTC

Jenkins Pipeline: Shared Groovy Libraries Plugin 552.vd9cc05b8a2e1 and earlier uses the names of Pipeline libraries to create cache directories without any sanitization, allowing attackers with Item/Configure permission to execute arbitrary code in the context of the Jenkins controller JVM using specially crafted library names if a global Pipeline library configured to use caching already exists.

CVE-2022-25182 jenkins vulnerability CVSS: 6.5 15 Feb 2022, 17:15 UTC

A sandbox bypass vulnerability in Jenkins Pipeline: Shared Groovy Libraries Plugin 552.vd9cc05b8a2e1 and earlier allows attackers with Item/Configure permission to execute arbitrary code on the Jenkins controller JVM using specially crafted library names if a global Pipeline library is already configured.

CVE-2022-25181 jenkins vulnerability CVSS: 6.5 15 Feb 2022, 17:15 UTC

A sandbox bypass vulnerability in Jenkins Pipeline: Shared Groovy Libraries Plugin 552.vd9cc05b8a2e1 and earlier allows attackers with Item/Configure permission to execute arbitrary code in the context of the Jenkins controller JVM through crafted SCM contents, if a global Pipeline library already exists.

CVE-2022-25180 jenkins vulnerability CVSS: 4.0 15 Feb 2022, 17:15 UTC

Jenkins Pipeline: Groovy Plugin 2648.va9433432b33c and earlier includes password parameters from the original build in replayed builds, allowing attackers with Run/Replay permission to obtain the values of password parameters passed to previous builds of a Pipeline.

CVE-2022-25179 jenkins vulnerability CVSS: 4.0 15 Feb 2022, 17:15 UTC

Jenkins Pipeline: Multibranch Plugin 706.vd43c65dec013 and earlier follows symbolic links to locations outside of the checkout directory for the configured SCM when reading files using the readTrusted step, allowing attackers able to configure Pipelines permission to read arbitrary files on the Jenkins controller file system.

CVE-2022-25178 jenkins vulnerability CVSS: 4.0 15 Feb 2022, 17:15 UTC

Jenkins Pipeline: Shared Groovy Libraries Plugin 552.vd9cc05b8a2e1 and earlier does not restrict the names of resources passed to the libraryResource step, allowing attackers able to configure Pipelines permission to read arbitrary files on the Jenkins controller file system.

CVE-2022-25177 jenkins vulnerability CVSS: 4.0 15 Feb 2022, 17:15 UTC

Jenkins Pipeline: Shared Groovy Libraries Plugin 552.vd9cc05b8a2e1 and earlier follows symbolic links to locations outside of the expected Pipeline library when reading files using the libraryResource step, allowing attackers able to configure Pipelines to read arbitrary files on the Jenkins controller file system.

CVE-2022-25176 jenkins vulnerability CVSS: 4.0 15 Feb 2022, 17:15 UTC

Jenkins Pipeline: Groovy Plugin 2648.va9433432b33c and earlier follows symbolic links to locations outside of the checkout directory for the configured SCM when reading the script file (typically Jenkinsfile) for Pipelines, allowing attackers able to configure Pipelines to read arbitrary files on the Jenkins controller file system.

CVE-2022-25175 jenkins vulnerability CVSS: 6.5 15 Feb 2022, 17:15 UTC

Jenkins Pipeline: Multibranch Plugin 706.vd43c65dec013 and earlier uses the same checkout directories for distinct SCMs for the readTrusted step, allowing attackers with Item/Configure permission to invoke arbitrary OS commands on the controller through crafted SCM contents.

CVE-2022-25174 jenkins vulnerability CVSS: 6.5 15 Feb 2022, 17:15 UTC

Jenkins Pipeline: Shared Groovy Libraries Plugin 552.vd9cc05b8a2e1 and earlier uses the same checkout directories for distinct SCMs for Pipeline libraries, allowing attackers with Item/Configure permission to invoke arbitrary OS commands on the controller through crafted SCM contents.

CVE-2022-25173 jenkins vulnerability CVSS: 6.5 15 Feb 2022, 17:15 UTC

Jenkins Pipeline: Groovy Plugin 2648.va9433432b33c and earlier uses the same checkout directories for distinct SCMs when reading the script file (typically Jenkinsfile) for Pipelines, allowing attackers with Item/Configure permission to invoke arbitrary OS commands on the controller through crafted SCM contents.

CVE-2022-0538 jenkins vulnerability CVSS: 5.0 09 Feb 2022, 14:15 UTC

Jenkins 2.333 and earlier, LTS 2.319.2 and earlier defines custom XStream converters that have not been updated to apply the protections for the vulnerability CVE-2021-43859 and allow unconstrained resource usage.

CVE-2022-23118 jenkins vulnerability CVSS: 9.0 12 Jan 2022, 20:15 UTC

Jenkins Debian Package Builder Plugin 1.6.11 and earlier implements functionality that allows agents to invoke command-line `git` at an attacker-specified path on the controller, allowing attackers able to control agent processes to invoke arbitrary OS commands on the controller.

CVE-2022-23117 jenkins vulnerability CVSS: 5.0 12 Jan 2022, 20:15 UTC

Jenkins Conjur Secrets Plugin 1.0.9 and earlier implements functionality that allows attackers able to control agent processes to retrieve all username/password credentials stored on the Jenkins controller.

CVE-2022-23116 jenkins vulnerability CVSS: 5.0 12 Jan 2022, 20:15 UTC

Jenkins Conjur Secrets Plugin 1.0.9 and earlier implements functionality that allows attackers able to control agent processes to decrypt secrets stored in Jenkins obtained through another method.

CVE-2022-23115 jenkins vulnerability CVSS: 5.8 12 Jan 2022, 20:15 UTC

Cross-site request forgery (CSRF) vulnerabilities in Jenkins batch task Plugin 1.19 and earlier allows attackers with Overall/Read access to retrieve logs, build or delete a batch task.

CVE-2022-23114 jenkins vulnerability CVSS: 2.1 12 Jan 2022, 20:15 UTC

Jenkins Publish Over SSH Plugin 1.22 and earlier stores password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.

CVE-2022-23113 jenkins vulnerability CVSS: 4.0 12 Jan 2022, 20:15 UTC

Jenkins Publish Over SSH Plugin 1.22 and earlier performs a validation of the file name specifying whether it is present or not, resulting in a path traversal vulnerability allowing attackers with Item/Configure permission to discover the name of the Jenkins controller files.

CVE-2022-23112 jenkins vulnerability CVSS: 4.0 12 Jan 2022, 20:15 UTC

A missing permission check in Jenkins Publish Over SSH Plugin 1.22 and earlier allows attackers with Overall/Read access to connect to an attacker-specified SSH server using attacker-specified credentials.

CVE-2022-23111 jenkins vulnerability CVSS: 4.3 12 Jan 2022, 20:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Publish Over SSH Plugin 1.22 and earlier allows attackers to connect to an attacker-specified SSH server using attacker-specified credentials.

CVE-2022-23110 jenkins vulnerability CVSS: 3.5 12 Jan 2022, 20:15 UTC

Jenkins Publish Over SSH Plugin 1.22 and earlier does not escape the SSH server name, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission.

CVE-2022-23109 jenkins vulnerability CVSS: 4.0 12 Jan 2022, 20:15 UTC

Jenkins HashiCorp Vault Plugin 3.7.0 and earlier does not mask Vault credentials in Pipeline build logs or in Pipeline step descriptions when Pipeline: Groovy Plugin 2.85 or later is installed.

CVE-2022-23108 jenkins vulnerability CVSS: 3.5 12 Jan 2022, 20:15 UTC

Jenkins Badge Plugin 1.9 and earlier does not escape the description and does not check for allowed protocols when creating a badge, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2022-23107 jenkins vulnerability CVSS: 5.5 12 Jan 2022, 20:15 UTC

Jenkins Warnings Next Generation Plugin 9.10.2 and earlier does not restrict the name of a file when configuring custom ID, allowing attackers with Item/Configure permission to write and read specific files with a hard-coded suffix on the Jenkins controller file system.

CVE-2022-23106 jenkins vulnerability CVSS: 5.0 12 Jan 2022, 20:15 UTC

Jenkins Configuration as Code Plugin 1.55 and earlier used a non-constant time comparison function when validating an authentication token allowing attackers to use statistical methods to obtain a valid authentication token.

CVE-2022-23105 jenkins vulnerability CVSS: 2.9 12 Jan 2022, 20:15 UTC

Jenkins Active Directory Plugin 2.25 and earlier does not encrypt the transmission of data between the Jenkins controller and Active Directory servers in most configurations.

CVE-2022-20621 jenkins vulnerability CVSS: 2.1 12 Jan 2022, 20:15 UTC

Jenkins Metrics Plugin 4.0.2.8 and earlier stores an access key unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.

CVE-2022-20620 jenkins vulnerability CVSS: 4.0 12 Jan 2022, 20:15 UTC

Missing permission checks in Jenkins SSH Agent Plugin 1.23 and earlier allows attackers with Overall/Read access to enumerate credentials IDs of credentials stored in Jenkins.

CVE-2022-20619 jenkins vulnerability CVSS: 5.8 12 Jan 2022, 20:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Bitbucket Branch Source Plugin 737.vdf9dc06105be and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2022-20618 jenkins vulnerability CVSS: 4.0 12 Jan 2022, 20:15 UTC

A missing permission check in Jenkins Bitbucket Branch Source Plugin 737.vdf9dc06105be and earlier allows attackers with Overall/Read access to enumerate credentials IDs of credentials stored in Jenkins.

CVE-2022-20617 jenkins vulnerability CVSS: 6.5 12 Jan 2022, 20:15 UTC

Jenkins Docker Commons Plugin 1.17 and earlier does not sanitize the name of an image or a tag, resulting in an OS command execution vulnerability exploitable by attackers with Item/Configure permission or able to control the contents of a previously configured job's SCM repository.

CVE-2022-20616 jenkins vulnerability CVSS: 4.0 12 Jan 2022, 20:15 UTC

Jenkins Credentials Binding Plugin 1.27 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read access to validate if a credential ID refers to a secret file credential and whether it's a zip file.

CVE-2022-20615 jenkins vulnerability CVSS: 3.5 12 Jan 2022, 20:15 UTC

Jenkins Matrix Project Plugin 1.19 and earlier does not escape HTML metacharacters in node and label names, and label descriptions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Agent/Configure permission.

CVE-2022-20614 jenkins vulnerability CVSS: 4.0 12 Jan 2022, 20:15 UTC

A missing permission check in Jenkins Mailer Plugin 391.ve4a_38c1b_cf4b_ and earlier allows attackers with Overall/Read access to use the DNS used by the Jenkins instance to resolve an attacker-specified hostname.

CVE-2022-20613 jenkins vulnerability CVSS: 4.3 12 Jan 2022, 20:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Mailer Plugin 391.ve4a_38c1b_cf4b_ and earlier allows attackers to use the DNS used by the Jenkins instance to resolve an attacker-specified hostname.

CVE-2022-20612 jenkins vulnerability CVSS: 2.6 12 Jan 2022, 20:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins 2.329 and earlier, LTS 2.319.1 and earlier allows attackers to trigger build of job without parameters when no security realm is set.

CVE-2021-43578 jenkins vulnerability CVSS: 5.5 12 Nov 2021, 11:15 UTC

Jenkins Squash TM Publisher (Squash4Jenkins) Plugin 1.0.0 and earlier implements an agent-to-controller message that does not implement any validation of its input, allowing attackers able to control agent processes to replace arbitrary files on the Jenkins controller file system with an attacker-controlled JSON string.

CVE-2021-43577 jenkins vulnerability CVSS: 5.5 12 Nov 2021, 11:15 UTC

Jenkins OWASP Dependency-Check Plugin 5.1.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2021-43576 jenkins vulnerability CVSS: 4.3 12 Nov 2021, 11:15 UTC

Jenkins pom2config Plugin 1.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks, allowing attackers with Overall/Read and Item/Read permissions to have Jenkins parse a crafted XML file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.

CVE-2021-21701 jenkins vulnerability CVSS: 4.0 12 Nov 2021, 11:15 UTC

Jenkins Performance Plugin 3.20 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2021-21700 jenkins vulnerability CVSS: 3.5 12 Nov 2021, 11:15 UTC

Jenkins Scriptler Plugin 3.3 and earlier does not escape the name of scripts on the UI when asking to confirm their deletion, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by exploitable by attackers able to create Scriptler scripts.

CVE-2021-21699 jenkins vulnerability CVSS: 3.5 12 Nov 2021, 11:15 UTC

Jenkins Active Choices Plugin 2.5.6 and earlier does not escape the parameter name of reactive parameters and dynamic reference parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.

CVE-2021-21698 jenkins vulnerability CVSS: 5.0 04 Nov 2021, 17:15 UTC

Jenkins Subversion Plugin 2.15.0 and earlier does not restrict the name of a file when looking up a subversion key file on the controller from an agent.

CVE-2021-21697 jenkins vulnerability CVSS: 6.4 04 Nov 2021, 17:15 UTC

Jenkins 2.318 and earlier, LTS 2.303.2 and earlier allows any agent to read and write the contents of any build directory stored in Jenkins with very few restrictions.

CVE-2021-21696 jenkins vulnerability CVSS: 7.5 04 Nov 2021, 17:15 UTC

Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not limit agent read/write access to the libs/ directory inside build directories when using the FilePath APIs, allowing attackers in control of agent processes to replace the code of a trusted library with a modified variant. This results in unsandboxed code execution in the Jenkins controller process.

CVE-2021-21695 jenkins vulnerability CVSS: 6.8 04 Nov 2021, 17:15 UTC

FilePath#listFiles lists files outside directories that agents are allowed to access when following symbolic links in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.

CVE-2021-21694 jenkins vulnerability CVSS: 7.5 04 Nov 2021, 17:15 UTC

FilePath#toURI, FilePath#hasSymlink, FilePath#absolutize, FilePath#isDescendant, and FilePath#get*DiskSpace do not check any permissions in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.

CVE-2021-21693 jenkins vulnerability CVSS: 7.5 04 Nov 2021, 17:15 UTC

When creating temporary files, agent-to-controller access to create those files is only checked after they've been created in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.

CVE-2021-21692 jenkins vulnerability CVSS: 7.5 04 Nov 2021, 17:15 UTC

FilePath#renameTo and FilePath#moveAllChildrenTo in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier only check 'read' agent-to-controller access permission on the source path, instead of 'delete'.

CVE-2021-21691 jenkins vulnerability CVSS: 7.5 04 Nov 2021, 17:15 UTC

Creating symbolic links is possible without the 'symlink' agent-to-controller access control permission in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.

CVE-2021-21690 jenkins vulnerability CVSS: 7.5 04 Nov 2021, 17:15 UTC

Agent processes are able to completely bypass file path filtering by wrapping the file operation in an agent file path in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.

CVE-2021-21689 jenkins vulnerability CVSS: 6.4 04 Nov 2021, 17:15 UTC

FilePath#unzip and FilePath#untar were not subject to any agent-to-controller access control in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.

CVE-2021-21688 jenkins vulnerability CVSS: 5.0 04 Nov 2021, 17:15 UTC

The agent-to-controller security check FilePath#reading(FileVisitor) in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not reject any operations, allowing users to have unrestricted read access using certain operations (creating archives, FilePath#copyRecursiveTo).

CVE-2021-21687 jenkins vulnerability CVSS: 6.4 04 Nov 2021, 17:15 UTC

Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not check agent-to-controller access to create symbolic links when unarchiving a symbolic link in FilePath#untar.

CVE-2021-21686 jenkins vulnerability CVSS: 5.8 04 Nov 2021, 17:15 UTC

File path filters in the agent-to-controller security subsystem of Jenkins 2.318 and earlier, LTS 2.303.2 and earlier do not canonicalize paths, allowing operations to follow symbolic links to outside allowed directories.

CVE-2021-21685 jenkins vulnerability CVSS: 6.4 04 Nov 2021, 17:15 UTC

Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not check agent-to-controller access to create parent directories in FilePath#mkdirs.

CVE-2021-21684 jenkins vulnerability CVSS: 4.3 06 Oct 2021, 23:15 UTC

Jenkins Git Plugin 4.8.2 and earlier does not escape the Git SHA-1 checksum parameters provided to commit notifications when displaying them in a build cause, resulting in a stored cross-site scripting (XSS) vulnerability.

CVE-2021-21683 jenkins vulnerability CVSS: 4.0 06 Oct 2021, 23:15 UTC

The file browser in Jenkins 2.314 and earlier, LTS 2.303.1 and earlier may interpret some paths to files as absolute on Windows, resulting in a path traversal vulnerability allowing attackers with Overall/Read permission (Windows controller) or Job/Workspace permission (Windows agents) to obtain the contents of arbitrary files.

CVE-2021-21682 jenkins vulnerability CVSS: 4.0 06 Oct 2021, 23:15 UTC

Jenkins 2.314 and earlier, LTS 2.303.1 and earlier accepts names of jobs and other entities with a trailing dot character, potentially replacing the configuration and data of other entities on Windows.

CVE-2021-21681 jenkins vulnerability CVSS: 2.1 31 Aug 2021, 14:15 UTC

Jenkins Nomad Plugin 0.7.4 and earlier stores Docker passwords unencrypted in the global config.xml file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.

CVE-2021-21680 jenkins vulnerability CVSS: 5.5 31 Aug 2021, 14:15 UTC

Jenkins Nested View Plugin 1.20 and earlier does not configure its XML transformer to prevent XML external entity (XXE) attacks.

CVE-2021-21679 jenkins vulnerability CVSS: 6.8 31 Aug 2021, 14:15 UTC

Jenkins Azure AD Plugin 179.vf6841393099e and earlier allows attackers to craft URLs that would bypass the CSRF protection of any target URL in Jenkins.

CVE-2021-21678 jenkins vulnerability CVSS: 6.8 31 Aug 2021, 14:15 UTC

Jenkins SAML Plugin 2.0.7 and earlier allows attackers to craft URLs that would bypass the CSRF protection of any target URL in Jenkins.

CVE-2021-21677 jenkins vulnerability CVSS: 6.5 31 Aug 2021, 14:15 UTC

Jenkins Code Coverage API Plugin 1.4.0 and earlier does not apply Jenkins JEP-200 deserialization protection to Java objects it deserializes from disk, resulting in a remote code execution vulnerability.

CVE-2021-21676 jenkins vulnerability CVSS: 4.0 30 Jun 2021, 17:15 UTC

Jenkins requests-plugin Plugin 2.2.7 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to send test emails to an attacker-specified email address.

CVE-2021-21675 jenkins vulnerability CVSS: 4.3 30 Jun 2021, 17:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins requests-plugin Plugin 2.2.12 and earlier allows attackers to create requests and/or have administrators apply pending requests.

CVE-2021-21674 jenkins vulnerability CVSS: 4.0 30 Jun 2021, 17:15 UTC

A missing permission check in Jenkins requests-plugin Plugin 2.2.6 and earlier allows attackers with Overall/Read permission to view the list of pending requests.

CVE-2021-21673 jenkins vulnerability CVSS: 5.8 30 Jun 2021, 17:15 UTC

Jenkins CAS Plugin 1.6.0 and earlier improperly determines that a redirect URL after login is legitimately pointing to Jenkins, allowing attackers to perform phishing attacks.

CVE-2021-21672 jenkins vulnerability CVSS: 4.0 30 Jun 2021, 17:15 UTC

Jenkins Selenium HTML report Plugin 1.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2021-21671 jenkins vulnerability CVSS: 5.1 30 Jun 2021, 17:15 UTC

Jenkins 2.299 and earlier, LTS 2.289.1 and earlier does not invalidate the previous session on login.

CVE-2021-21670 jenkins vulnerability CVSS: 4.0 30 Jun 2021, 17:15 UTC

Jenkins 2.299 and earlier, LTS 2.289.1 and earlier allows users to cancel queue items and abort builds of jobs for which they have Item/Cancel permission even when they do not have Item/Read permission.

CVE-2021-21669 jenkins vulnerability CVSS: 7.5 18 Jun 2021, 10:15 UTC

Jenkins Generic Webhook Trigger Plugin 1.72 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2021-21668 jenkins vulnerability CVSS: 3.5 16 Jun 2021, 14:15 UTC

Jenkins Scriptler Plugin 3.1 and earlier does not escape script content, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Scriptler/Configure permission.

CVE-2021-21667 jenkins vulnerability CVSS: 3.5 16 Jun 2021, 14:15 UTC

Jenkins Scriptler Plugin 3.2 and earlier does not escape parameter names shown in job configuration forms, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Scriptler/Configure permission.

CVE-2021-21666 jenkins vulnerability CVSS: 4.3 10 Jun 2021, 15:15 UTC

Jenkins Kiuwan Plugin 1.6.0 and earlier does not escape query parameters in an error message for a form validation endpoint, resulting in a reflected cross-site scripting (XSS) vulnerability.

CVE-2021-21665 jenkins vulnerability CVSS: 6.0 10 Jun 2021, 15:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins XebiaLabs XL Deploy Plugin 10.0.1 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing Username/password credentials stored in Jenkins.

CVE-2021-21664 jenkins vulnerability CVSS: 4.0 10 Jun 2021, 15:15 UTC

An incorrect permission check in Jenkins XebiaLabs XL Deploy Plugin 10.0.1 and earlier allows attackers with Generic Create permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing Username/password credentials stored in Jenkins.

CVE-2021-21663 jenkins vulnerability CVSS: 4.0 10 Jun 2021, 15:15 UTC

A missing permission check in Jenkins XebiaLabs XL Deploy Plugin 7.5.8 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing Username/password credentials stored in Jenkins.

CVE-2021-21662 jenkins vulnerability CVSS: 4.0 10 Jun 2021, 15:15 UTC

A missing permission check in Jenkins XebiaLabs XL Deploy Plugin 10.0.1 and earlier allows attackers with Overall/Read permission to enumerate credentials ID of credentials stored in Jenkins.

CVE-2021-21661 jenkins vulnerability CVSS: 4.0 10 Jun 2021, 15:15 UTC

Jenkins Kubernetes CLI Plugin 1.10.0 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVE-2021-21660 jenkins vulnerability CVSS: 3.5 25 May 2021, 17:15 UTC

Jenkins Markdown Formatter Plugin 0.1.0 and earlier does not sanitize crafted link target URLs, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with the ability to edit any description rendered using the configured markup formatter.

CVE-2021-21659 jenkins vulnerability CVSS: 5.5 25 May 2021, 17:15 UTC

Jenkins URLTrigger Plugin 0.48 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2021-21658 jenkins vulnerability CVSS: 6.4 25 May 2021, 17:15 UTC

Jenkins Nuget Plugin 1.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2021-21657 jenkins vulnerability CVSS: 6.5 25 May 2021, 17:15 UTC

Jenkins Filesystem Trigger Plugin 0.40 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2021-21656 jenkins vulnerability CVSS: 5.5 11 May 2021, 15:15 UTC

Jenkins Xcode integration Plugin 2.0.14 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2021-21655 jenkins vulnerability CVSS: 5.8 11 May 2021, 15:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins P4 Plugin 1.11.4 and earlier allows attackers to connect to an attacker-specified Perforce server using attacker-specified username and password.

CVE-2021-21654 jenkins vulnerability CVSS: 4.0 11 May 2021, 15:15 UTC

Jenkins P4 Plugin 1.11.4 and earlier does not perform permission checks in multiple HTTP endpoints, allowing attackers with Overall/Read permission to connect to an attacker-specified Perforce server using attacker-specified username and password.

CVE-2021-21653 jenkins vulnerability CVSS: 4.0 11 May 2021, 15:15 UTC

Jenkins Xray - Test Management for Jira Plugin 2.4.0 and earlier does not perform a permission check in an HTTP endpoint, allowing with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVE-2021-21652 jenkins vulnerability CVSS: 5.8 11 May 2021, 15:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Xray - Test Management for Jira Plugin 2.4.0 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2021-21651 jenkins vulnerability CVSS: 4.0 11 May 2021, 15:15 UTC

Jenkins S3 publisher Plugin 0.11.6 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to obtain the list of configured profiles.

CVE-2021-21650 jenkins vulnerability CVSS: 3.5 11 May 2021, 15:15 UTC

Jenkins S3 publisher Plugin 0.11.6 and earlier does not perform Run/Artifacts permission checks in various HTTP endpoints and API models, allowing attackers with Item/Read permission to obtain information about artifacts uploaded to S3, if the optional Run/Artifacts permission is enabled.

CVE-2021-21649 jenkins vulnerability CVSS: 3.5 11 May 2021, 15:15 UTC

Jenkins Dashboard View Plugin 2.15 and earlier does not escape URLs referenced in Image Dashboard Portlets, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with View/Configure permission.

CVE-2021-21648 jenkins vulnerability CVSS: 4.3 11 May 2021, 15:15 UTC

Jenkins Credentials Plugin 2.3.18 and earlier does not escape user-controlled information on a view it provides, resulting in a reflected cross-site scripting (XSS) vulnerability.

CVE-2021-21647 jenkins vulnerability CVSS: 4.0 21 Apr 2021, 15:15 UTC

Jenkins CloudBees CD Plugin 1.1.21 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Item/Read permission to schedule builds of projects without having Item/Build permission.

CVE-2021-21646 jenkins vulnerability CVSS: 6.5 21 Apr 2021, 15:15 UTC

Jenkins Templating Engine Plugin 2.1 and earlier does not protect its pipeline configurations using Script Security Plugin, allowing attackers with Job/Configure permission to execute arbitrary code in the context of the Jenkins controller JVM.

CVE-2021-21645 jenkins vulnerability CVSS: 4.0 21 Apr 2021, 15:15 UTC

Jenkins Config File Provider Plugin 3.7.0 and earlier does not perform permission checks in several HTTP endpoints, attackers with Overall/Read permission to enumerate configuration file IDs.

CVE-2021-21644 jenkins vulnerability CVSS: 5.8 21 Apr 2021, 15:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Config File Provider Plugin 3.7.0 and earlier allows attackers to delete configuration files corresponding to an attacker-specified ID.

CVE-2021-21643 jenkins vulnerability CVSS: 4.0 21 Apr 2021, 15:15 UTC

Jenkins Config File Provider Plugin 3.7.0 and earlier does not correctly perform permission checks in several HTTP endpoints, allowing attackers with global Job/Configure permission to enumerate system-scoped credentials IDs of credentials stored in Jenkins.

CVE-2021-21642 jenkins vulnerability CVSS: 5.5 21 Apr 2021, 15:15 UTC

Jenkins Config File Provider Plugin 3.7.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2021-21641 jenkins vulnerability CVSS: 4.3 07 Apr 2021, 14:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins promoted builds Plugin 3.9 and earlier allows attackers to to promote builds.

CVE-2021-21640 jenkins vulnerability CVSS: 4.0 07 Apr 2021, 14:15 UTC

Jenkins 2.286 and earlier, LTS 2.277.1 and earlier does not properly check that a newly created view has an allowed name, allowing attackers with View/Create permission to create views with invalid or already-used names.

CVE-2021-21639 jenkins vulnerability CVSS: 4.0 07 Apr 2021, 14:15 UTC

Jenkins 2.286 and earlier, LTS 2.277.1 and earlier does not validate the type of object created after loading the data submitted to the `config.xml` REST API endpoint of a node, allowing attackers with Computer/Configure permission to replace a node with one of a different type.

CVE-2021-28165 jenkins vulnerability CVSS: 7.8 01 Apr 2021, 15:15 UTC

In Eclipse Jetty 7.2.2 to 9.4.38, 10.0.0.alpha0 to 10.0.1, and 11.0.0.alpha0 to 11.0.1, CPU usage can reach 100% upon receiving a large invalid TLS frame.

CVE-2021-21638 jenkins vulnerability CVSS: 6.8 30 Mar 2021, 12:16 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Team Foundation Server Plugin 5.157.1 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2021-21637 jenkins vulnerability CVSS: 4.0 30 Mar 2021, 12:16 UTC

A missing permission check in Jenkins Team Foundation Server Plugin 5.157.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2021-21636 jenkins vulnerability CVSS: 4.0 30 Mar 2021, 12:16 UTC

A missing permission check in Jenkins Team Foundation Server Plugin 5.157.1 and earlier allows attackers with Overall/Read permission to enumerate credentials ID of credentials stored in Jenkins.

CVE-2021-21635 jenkins vulnerability CVSS: 3.5 30 Mar 2021, 12:16 UTC

Jenkins REST List Parameter Plugin 1.3.0 and earlier does not escape a parameter name reference in embedded JavaScript, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.

CVE-2021-21634 jenkins vulnerability CVSS: 4.0 30 Mar 2021, 12:16 UTC

Jenkins Jabber (XMPP) notifier and control Plugin 1.41 and earlier stores passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.

CVE-2021-21633 jenkins vulnerability CVSS: 6.8 30 Mar 2021, 12:16 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins OWASP Dependency-Track Plugin 3.1.0 and earlier allows attackers to connect to an attacker-specified URL, capturing credentials stored in Jenkins.

CVE-2021-21632 jenkins vulnerability CVSS: 4.0 30 Mar 2021, 12:16 UTC

A missing permission check in Jenkins OWASP Dependency-Track Plugin 3.1.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL, capturing credentials stored in Jenkins.

CVE-2021-21631 jenkins vulnerability CVSS: 4.0 30 Mar 2021, 12:16 UTC

Jenkins Cloud Statistics Plugin 0.26 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission and knowledge of random activity IDs to view related provisioning exception error messages.

CVE-2021-21630 jenkins vulnerability CVSS: 3.5 30 Mar 2021, 12:16 UTC

Jenkins Extra Columns Plugin 1.22 and earlier does not escape parameter values in the build parameters column, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.

CVE-2021-21629 jenkins vulnerability CVSS: 6.8 30 Mar 2021, 12:16 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Build With Parameters Plugin 1.5 and earlier allows attackers to build a project with attacker-specified parameters.

CVE-2021-21628 jenkins vulnerability CVSS: 3.5 30 Mar 2021, 12:16 UTC

Jenkins Build With Parameters Plugin 1.5 and earlier does not escape parameter names and descriptions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.

CVE-2021-21627 jenkins vulnerability CVSS: 6.8 18 Mar 2021, 14:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Libvirt Agents Plugin 1.9.0 and earlier allows attackers to stop hypervisor domains.

CVE-2021-21626 jenkins vulnerability CVSS: 4.0 18 Mar 2021, 14:15 UTC

Jenkins Warnings Next Generation Plugin 8.4.4 and earlier does not perform a permission check in methods implementing form validation, allowing attackers with Item/Read permission but without Item/Workspace or Item/Configure permission to check whether attacker-specified file patterns match workspace contents.

CVE-2021-21625 jenkins vulnerability CVSS: 4.0 18 Mar 2021, 14:15 UTC

Jenkins CloudBees AWS Credentials Plugin 1.28 and earlier does not perform a permission check in a helper method for HTTP endpoints, allowing attackers with Overall/Read permission to enumerate credentials IDs of AWS credentials stored in Jenkins in some circumstances.

CVE-2021-21624 jenkins vulnerability CVSS: 4.0 18 Mar 2021, 14:15 UTC

An incorrect permission check in Jenkins Role-based Authorization Strategy Plugin 3.1 and earlier allows attackers with Item/Read permission on nested items to access them, even if they lack Item/Read permission for parent folders.

CVE-2021-21623 jenkins vulnerability CVSS: 4.0 18 Mar 2021, 14:15 UTC

An incorrect permission check in Jenkins Matrix Authorization Strategy Plugin 2.6.5 and earlier allows attackers with Item/Read permission on nested items to access them, even if they lack Item/Read permission for parent folders.

CVE-2021-21622 jenkins vulnerability CVSS: 3.5 24 Feb 2021, 16:15 UTC

Jenkins Artifact Repository Parameter Plugin 1.0.0 and earlier does not escape parameter names and descriptions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.

CVE-2021-21621 jenkins vulnerability CVSS: 5.0 24 Feb 2021, 16:15 UTC

Jenkins Support Core Plugin 2.72 and earlier provides the serialized user authentication as part of the "About user (basic authentication details only)" information, which can include the session ID of the user creating the support bundle in some configurations.

CVE-2021-21620 jenkins vulnerability CVSS: 4.3 24 Feb 2021, 16:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Claim Plugin 2.18.1 and earlier allows attackers to change claims.

CVE-2021-21619 jenkins vulnerability CVSS: 3.5 24 Feb 2021, 16:15 UTC

Jenkins Claim Plugin 2.18.1 and earlier does not escape the user display name, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers who are able to control the display names of Jenkins users, either via the security realm, or directly inside Jenkins.

CVE-2021-21618 jenkins vulnerability CVSS: 3.5 24 Feb 2021, 16:15 UTC

Jenkins Repository Connector Plugin 2.0.2 and earlier does not escape parameter names and descriptions for past builds, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

CVE-2021-21617 jenkins vulnerability CVSS: 6.8 24 Feb 2021, 16:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Configuration Slicing Plugin 1.51 and earlier allows attackers to apply different slice configurations.

CVE-2021-21616 jenkins vulnerability CVSS: 3.5 24 Feb 2021, 16:15 UTC

Jenkins Active Choices Plugin 2.5.2 and earlier does not escape reference parameter values, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.

CVE-2021-21615 jenkins vulnerability CVSS: 3.5 26 Jan 2021, 18:16 UTC

Jenkins 2.275 and LTS 2.263.2 allows reading arbitrary files using the file browser for workspaces and archived artifacts due to a time-of-check to time-of-use (TOCTOU) race condition.

CVE-2021-21614 jenkins vulnerability CVSS: 2.1 13 Jan 2021, 16:15 UTC

Jenkins Bumblebee HP ALM Plugin 4.1.5 and earlier stores credentials unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.

CVE-2021-21613 jenkins vulnerability CVSS: 4.3 13 Jan 2021, 16:15 UTC

Jenkins TICS Plugin 2020.3.0.6 and earlier does not escape TICS service responses, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers able to control TICS service response content.

CVE-2021-21612 jenkins vulnerability CVSS: 2.1 13 Jan 2021, 16:15 UTC

Jenkins TraceTronic ECU-TEST Plugin 2.23.1 and earlier stores credentials unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.

CVE-2021-21611 jenkins vulnerability CVSS: 3.5 13 Jan 2021, 16:15 UTC

Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape display names and IDs of item types shown on the New Item page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to specify display names or IDs of item types.

CVE-2021-21610 jenkins vulnerability CVSS: 4.3 13 Jan 2021, 16:15 UTC

Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not implement any restrictions for the URL rendering a formatted preview of markup passed as a query parameter, resulting in a reflected cross-site scripting (XSS) vulnerability if the configured markup formatter does not prohibit unsafe elements (JavaScript) in markup.

CVE-2021-21609 jenkins vulnerability CVSS: 5.0 13 Jan 2021, 16:15 UTC

Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not correctly match requested URLs to the list of always accessible paths, allowing attackers without Overall/Read permission to access some URLs as if they did have Overall/Read permission.

CVE-2021-21608 jenkins vulnerability CVSS: 3.5 13 Jan 2021, 16:15 UTC

Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape button labels in the Jenkins UI, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers with the ability to control button labels.

CVE-2021-21607 jenkins vulnerability CVSS: 4.0 13 Jan 2021, 16:15 UTC

Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not limit sizes provided as query parameters to graph-rendering URLs, allowing attackers to request crafted URLs that use all available memory in Jenkins, potentially leading to out of memory errors.

CVE-2021-21606 jenkins vulnerability CVSS: 4.0 13 Jan 2021, 16:15 UTC

Jenkins 2.274 and earlier, LTS 2.263.1 and earlier improperly validates the format of a provided fingerprint ID when checking for its existence allowing an attacker to check for the existence of XML files with a short path.

CVE-2021-21605 jenkins vulnerability CVSS: 6.0 13 Jan 2021, 16:15 UTC

Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows users with Agent/Configure permission to choose agent names that cause Jenkins to override the global `config.xml` file.

CVE-2021-21604 jenkins vulnerability CVSS: 6.0 13 Jan 2021, 16:15 UTC

Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows attackers with permission to create or configure various objects to inject crafted content into Old Data Monitor that results in the instantiation of potentially unsafe objects once discarded by an administrator.

CVE-2021-21603 jenkins vulnerability CVSS: 3.5 13 Jan 2021, 16:15 UTC

Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape notification bar response contents, resulting in a cross-site scripting (XSS) vulnerability.

CVE-2021-21602 jenkins vulnerability CVSS: 4.0 13 Jan 2021, 16:15 UTC

Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows reading arbitrary files using the file browser for workspaces and archived artifacts by following symlinks.

CVE-2020-2324 jenkins vulnerability CVSS: 5.0 03 Dec 2020, 16:15 UTC

Jenkins CVS Plugin 2.16 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2020-2321 jenkins vulnerability CVSS: 5.8 03 Dec 2020, 16:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Shelve Project Plugin 3.0 and earlier allows attackers to shelve, unshelve, or delete a project.

CVE-2020-2320 jenkins vulnerability CVSS: 10.0 03 Dec 2020, 16:15 UTC

Jenkins Plugin Installation Manager Tool 2.1.3 and earlier does not verify plugin downloads.

CVE-2020-2319 jenkins vulnerability CVSS: 4.0 04 Nov 2020, 15:15 UTC

Jenkins VMware Lab Manager Slaves Plugin 0.2.8 and earlier stores a password unencrypted in the global config.xml file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.

CVE-2020-2318 jenkins vulnerability CVSS: 4.0 04 Nov 2020, 15:15 UTC

Jenkins Mail Commander Plugin for Jenkins-ci Plugin 1.0.0 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.

CVE-2020-2317 jenkins vulnerability CVSS: 3.5 04 Nov 2020, 15:15 UTC

Jenkins FindBugs Plugin 5.0.0 and earlier does not escape the annotation message in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide report files to Jenkins FindBugs Plugin's post build step.

CVE-2020-2316 jenkins vulnerability CVSS: 3.5 04 Nov 2020, 15:15 UTC

Jenkins Static Analysis Utilities Plugin 1.96 and earlier does not escape the annotation message in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.

CVE-2020-2315 jenkins vulnerability CVSS: 4.0 04 Nov 2020, 15:15 UTC

Jenkins Visualworks Store Plugin 1.1.3 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2020-2314 jenkins vulnerability CVSS: 2.1 04 Nov 2020, 15:15 UTC

Jenkins AppSpider Plugin 1.0.12 and earlier stores a password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.

CVE-2020-2313 jenkins vulnerability CVSS: 4.0 04 Nov 2020, 15:15 UTC

A missing permission check in Jenkins Azure Key Vault Plugin 2.0 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVE-2020-2312 jenkins vulnerability CVSS: 4.0 04 Nov 2020, 15:15 UTC

Jenkins SQLPlus Script Runner Plugin 2.0.12 and earlier does not mask a password provided as command line argument in build logs.

CVE-2020-2311 jenkins vulnerability CVSS: 4.0 04 Nov 2020, 15:15 UTC

A missing permission check in Jenkins AWS Global Configuration Plugin 1.5 and earlier allows attackers with Overall/Read permission to replace the global AWS configuration.

CVE-2020-2310 jenkins vulnerability CVSS: 4.0 04 Nov 2020, 15:15 UTC

Missing permission checks in Jenkins Ansible Plugin 1.0 and earlier allow attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVE-2020-2309 jenkins vulnerability CVSS: 4.0 04 Nov 2020, 15:15 UTC

A missing/An incorrect permission check in Jenkins Kubernetes Plugin 1.27.3 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVE-2020-2308 jenkins vulnerability CVSS: 4.0 04 Nov 2020, 15:15 UTC

A missing permission check in Jenkins Kubernetes Plugin 1.27.3 and earlier allows attackers with Overall/Read permission to list global pod template names.

CVE-2020-2307 jenkins vulnerability CVSS: 4.0 04 Nov 2020, 15:15 UTC

Jenkins Kubernetes Plugin 1.27.3 and earlier allows low-privilege users to access possibly sensitive Jenkins controller environment variables.

CVE-2020-2306 jenkins vulnerability CVSS: 4.0 04 Nov 2020, 15:15 UTC

A missing permission check in Jenkins Mercurial Plugin 2.11 and earlier allows attackers with Overall/Read permission to obtain a list of names of configured Mercurial installations.

CVE-2020-2305 jenkins vulnerability CVSS: 4.0 04 Nov 2020, 15:15 UTC

Jenkins Mercurial Plugin 2.11 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2020-2304 jenkins vulnerability CVSS: 4.0 04 Nov 2020, 15:15 UTC

Jenkins Subversion Plugin 2.13.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2020-2303 jenkins vulnerability CVSS: 4.3 04 Nov 2020, 15:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Active Directory Plugin 2.19 and earlier allows attackers to perform connection tests, connecting to attacker-specified or previously configured Active Directory servers using attacker-specified credentials.

CVE-2020-2302 jenkins vulnerability CVSS: 4.0 04 Nov 2020, 15:15 UTC

A missing permission check in Jenkins Active Directory Plugin 2.19 and earlier allows attackers with Overall/Read permission to access the domain health check diagnostic page.

CVE-2020-2301 jenkins vulnerability CVSS: 7.5 04 Nov 2020, 15:15 UTC

Jenkins Active Directory Plugin 2.19 and earlier allows attackers to log in as any user with any password while a successful authentication of that user is still in the optional cache when using Windows/ADSI mode.

CVE-2020-2300 jenkins vulnerability CVSS: 7.5 04 Nov 2020, 15:15 UTC

Jenkins Active Directory Plugin 2.19 and earlier does not prohibit the use of an empty password in Windows/ADSI mode, which allows attackers to log in to Jenkins as any user depending on the configuration of the Active Directory server.

CVE-2020-2299 jenkins vulnerability CVSS: 7.5 04 Nov 2020, 15:15 UTC

Jenkins Active Directory Plugin 2.19 and earlier allows attackers to log in as any user if a magic constant is used as the password.

CVE-2020-2298 jenkins vulnerability CVSS: 4.0 08 Oct 2020, 13:15 UTC

Jenkins Nerrvana Plugin 1.02.06 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2020-2297 jenkins vulnerability CVSS: 2.1 08 Oct 2020, 13:15 UTC

Jenkins SMS Notification Plugin 1.2 and earlier stores an access token unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.

CVE-2020-2296 jenkins vulnerability CVSS: 4.3 08 Oct 2020, 13:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Shared Objects Plugin 0.44 and earlier allows attackers to configure shared objects.

CVE-2020-2293 jenkins vulnerability CVSS: 4.0 08 Oct 2020, 13:15 UTC

Jenkins Persona Plugin 2.4 and earlier allows users with Overall/Read permission to read arbitrary files on the Jenkins controller.

CVE-2020-2292 jenkins vulnerability CVSS: 3.5 08 Oct 2020, 13:15 UTC

Jenkins Release Plugin 2.10.2 and earlier does not escape the release version in badge tooltip, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Release/Release permission.

CVE-2020-2291 jenkins vulnerability CVSS: 2.1 08 Oct 2020, 13:15 UTC

Jenkins couchdb-statistics Plugin 0.3 and earlier stores its server password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.

CVE-2020-2290 jenkins vulnerability CVSS: 3.5 08 Oct 2020, 13:15 UTC

Jenkins Active Choices Plugin 2.4 and earlier does not escape some return values of sandboxed scripts for Reactive Reference Parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.

CVE-2020-2289 jenkins vulnerability CVSS: 3.5 08 Oct 2020, 13:15 UTC

Jenkins Active Choices Plugin 2.4 and earlier does not escape the name and description of build parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.

CVE-2020-2288 jenkins vulnerability CVSS: 5.0 08 Oct 2020, 13:15 UTC

In Jenkins Audit Trail Plugin 3.6 and earlier, the default regular expression pattern could be bypassed in many cases by adding a suffix to the URL that would be ignored during request handling.

CVE-2020-2287 jenkins vulnerability CVSS: 5.0 08 Oct 2020, 13:15 UTC

Jenkins Audit Trail Plugin 3.6 and earlier applies pattern matching to a different representation of request URL paths than the Stapler web framework uses for dispatching requests, which allows attackers to craft URLs that bypass request logging of any target URL.

CVE-2020-2286 jenkins vulnerability CVSS: 6.8 08 Oct 2020, 13:15 UTC

Jenkins Role-based Authorization Strategy Plugin 3.0 and earlier does not properly invalidate a permission cache when the configuration is changed, resulting in permissions being granted based on an outdated configuration.

CVE-2020-2285 jenkins vulnerability CVSS: 4.0 23 Sep 2020, 14:15 UTC

A missing permission check in Jenkins Liquibase Runner Plugin 1.4.7 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVE-2020-2284 jenkins vulnerability CVSS: 5.5 23 Sep 2020, 14:15 UTC

Jenkins Liquibase Runner Plugin 1.4.5 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2020-2283 jenkins vulnerability CVSS: 3.5 23 Sep 2020, 14:15 UTC

Jenkins Liquibase Runner Plugin 1.4.5 and earlier does not escape changeset contents, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by users able to control changeset files evaluated by the plugin.

CVE-2020-2282 jenkins vulnerability CVSS: 4.0 23 Sep 2020, 14:15 UTC

Jenkins Implied Labels Plugin 0.6 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to configure the plugin.

CVE-2020-2281 jenkins vulnerability CVSS: 5.8 23 Sep 2020, 14:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Lockable Resources Plugin 2.8 and earlier allows attackers to reserve, unreserve, unlock, and reset resources.

CVE-2020-2280 jenkins vulnerability CVSS: 6.8 23 Sep 2020, 14:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Warnings Plugin 5.0.1 and earlier allows attackers to execute arbitrary code.

CVE-2020-2279 jenkins vulnerability CVSS: 6.5 23 Sep 2020, 14:15 UTC

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.74 and earlier allows attackers with permission to define sandboxed scripts to provide crafted return values or script binding content that can result in arbitrary code execution on the Jenkins controller JVM.

CVE-2020-2278 jenkins vulnerability CVSS: 4.0 16 Sep 2020, 14:15 UTC

Jenkins Storable Configs Plugin 1.0 and earlier does not restrict the user-specified file name, allowing attackers with Job/Configure permission to replace any other '.xml' file on the Jenkins controller with a job config.xml file's content.

CVE-2020-2277 jenkins vulnerability CVSS: 4.0 16 Sep 2020, 14:15 UTC

Jenkins Storable Configs Plugin 1.0 and earlier allows users with Job/Read permission to read arbitrary files on the Jenkins controller.

CVE-2020-2276 jenkins vulnerability CVSS: 9.0 16 Sep 2020, 14:15 UTC

Jenkins Selection tasks Plugin 1.0 and earlier executes a user-specified program on the Jenkins controller, allowing attackers with Job/Configure permission to execute an arbitrary system command on the Jenkins controller as the OS user that the Jenkins process is running as.

CVE-2020-2275 jenkins vulnerability CVSS: 4.0 16 Sep 2020, 14:15 UTC

Jenkins Copy data to workspace Plugin 1.0 and earlier does not limit which directories can be copied from the Jenkins controller to job workspaces, allowing attackers with Job/Configure permission to read arbitrary files on the Jenkins controller.

CVE-2020-2274 jenkins vulnerability CVSS: 2.1 16 Sep 2020, 14:15 UTC

Jenkins ElasTest Plugin 1.2.1 and earlier stores its server password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.

CVE-2020-2273 jenkins vulnerability CVSS: 4.3 16 Sep 2020, 14:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins ElasTest Plugin 1.2.1 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials.

CVE-2020-2272 jenkins vulnerability CVSS: 4.0 16 Sep 2020, 14:15 UTC

A missing permission check in Jenkins ElasTest Plugin 1.2.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.

CVE-2020-2271 jenkins vulnerability CVSS: 3.5 16 Sep 2020, 14:15 UTC

Jenkins Locked Files Report Plugin 1.6 and earlier does not escape locked files' names in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.

CVE-2020-2270 jenkins vulnerability CVSS: 3.5 16 Sep 2020, 14:15 UTC

Jenkins ClearCase Release Plugin 0.3 and earlier does not escape the composite baseline in badge tooltip, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.

CVE-2020-2269 jenkins vulnerability CVSS: 3.5 16 Sep 2020, 14:15 UTC

Jenkins chosen-views-tabbar Plugin 1.2 and earlier does not escape view names in the dropdown to select views, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with the ability to configure views.

CVE-2020-2268 jenkins vulnerability CVSS: 6.8 16 Sep 2020, 14:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins MongoDB Plugin 1.3 and earlier allows attackers to gain access to some metadata of any arbitrary files on the Jenkins controller.

CVE-2020-2267 jenkins vulnerability CVSS: 4.0 16 Sep 2020, 14:15 UTC

A missing permission check in Jenkins MongoDB Plugin 1.3 and earlier allows attackers with Overall/Read permission to gain access to some metadata of any arbitrary files on the Jenkins controller.

CVE-2020-2266 jenkins vulnerability CVSS: 3.5 16 Sep 2020, 14:15 UTC

Jenkins Description Column Plugin 1.3 and earlier does not escape the job description in the column tooltip, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.

CVE-2020-2265 jenkins vulnerability CVSS: 3.5 16 Sep 2020, 14:15 UTC

Jenkins Coverage/Complexity Scatter Plot Plugin 1.1.1 and earlier does not escape the method information in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide report files to the plugin's post-build step.

CVE-2020-2264 jenkins vulnerability CVSS: 3.5 16 Sep 2020, 14:15 UTC

Jenkins Custom Job Icon Plugin 0.2 and earlier does not escape the job descriptions in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.

CVE-2020-2263 jenkins vulnerability CVSS: 3.5 16 Sep 2020, 14:15 UTC

Jenkins Radiator View Plugin 1.29 and earlier does not escape the full name of the jobs in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.

CVE-2020-2262 jenkins vulnerability CVSS: 3.5 16 Sep 2020, 14:15 UTC

Jenkins Android Lint Plugin 2.6 and earlier does not escape the annotation message in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide report files to the plugin's post-build step.

CVE-2020-2261 jenkins vulnerability CVSS: 6.5 16 Sep 2020, 14:15 UTC

Jenkins Perfecto Plugin 1.17 and earlier executes a command on the Jenkins controller, allowing attackers with Job/Configure permission to run arbitrary commands on the Jenkins controller

CVE-2020-2260 jenkins vulnerability CVSS: 4.0 16 Sep 2020, 14:15 UTC

A missing permission check in Jenkins Perfecto Plugin 1.17 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified HTTP URL using attacker-specified credentials.

CVE-2020-2259 jenkins vulnerability CVSS: 3.5 16 Sep 2020, 14:15 UTC

Jenkins computer-queue-plugin Plugin 1.5 and earlier does not escape the agent name in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Agent/Configure permission.

CVE-2020-2258 jenkins vulnerability CVSS: 4.0 16 Sep 2020, 14:15 UTC

Jenkins Health Advisor by CloudBees Plugin 3.2.0 and earlier does not correctly perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to view that HTTP endpoint.

CVE-2020-2257 jenkins vulnerability CVSS: 3.5 16 Sep 2020, 14:15 UTC

Jenkins Validating String Parameter Plugin 2.4 and earlier does not escape various user-controlled fields, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.

CVE-2020-2256 jenkins vulnerability CVSS: 3.5 16 Sep 2020, 14:15 UTC

Jenkins Pipeline Maven Integration Plugin 3.9.2 and earlier does not escape the upstream job's display name shown as part of a build cause, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.

CVE-2020-2255 jenkins vulnerability CVSS: 4.0 16 Sep 2020, 14:15 UTC

A missing permission check in Jenkins Blue Ocean Plugin 1.23.2 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL.

CVE-2020-2254 jenkins vulnerability CVSS: 3.5 16 Sep 2020, 14:15 UTC

Jenkins Blue Ocean Plugin 1.23.2 and earlier provides an undocumented feature flag that, when enabled, allows an attacker with Job/Configure or Job/Create permission to read arbitrary files on the Jenkins controller file system.

CVE-2020-2253 jenkins vulnerability CVSS: 5.8 16 Sep 2020, 14:15 UTC

Jenkins Email Extension Plugin 2.75 and earlier does not perform hostname validation when connecting to the configured SMTP server.

CVE-2020-2252 jenkins vulnerability CVSS: 5.8 16 Sep 2020, 14:15 UTC

Jenkins Mailer Plugin 1.32 and earlier does not perform hostname validation when connecting to the configured SMTP server.

CVE-2020-2251 jenkins vulnerability CVSS: 4.0 01 Sep 2020, 14:15 UTC

Jenkins SoapUI Pro Functional Testing Plugin 1.5 and earlier transmits project passwords in its configuration in plain text as part of job configuration forms, potentially resulting in their exposure.

CVE-2020-2250 jenkins vulnerability CVSS: 4.0 01 Sep 2020, 14:15 UTC

Jenkins SoapUI Pro Functional Testing Plugin 1.3 and earlier stores project passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by attackers with Extended Read permission, or access to the Jenkins controller file system.

CVE-2020-2249 jenkins vulnerability CVSS: 2.1 01 Sep 2020, 14:15 UTC

Jenkins Team Foundation Server Plugin 5.157.1 and earlier stores a webhook secret unencrypted in its global configuration file on the Jenkins controller where it can be viewed by attackers with access to the Jenkins controller file system.

CVE-2020-2248 jenkins vulnerability CVSS: 4.3 01 Sep 2020, 14:15 UTC

Jenkins JSGames Plugin 0.2 and earlier evaluates part of a URL as code, resulting in a reflected cross-site scripting (XSS) vulnerability.

CVE-2020-2247 jenkins vulnerability CVSS: 4.0 01 Sep 2020, 14:15 UTC

Jenkins Klocwork Analysis Plugin 2020.2.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2020-2246 jenkins vulnerability CVSS: 3.5 01 Sep 2020, 14:15 UTC

Jenkins Valgrind Plugin 0.28 and earlier does not escape content in Valgrind XML reports, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control Valgrind XML report contents.

CVE-2020-2245 jenkins vulnerability CVSS: 5.5 01 Sep 2020, 14:15 UTC

Jenkins Valgrind Plugin 0.28 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2020-2244 jenkins vulnerability CVSS: 3.5 01 Sep 2020, 14:15 UTC

Jenkins Build Failure Analyzer Plugin 1.27.0 and earlier does not escape matching text in a form validation response, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers able to provide console output for builds used to test build log indications.

CVE-2020-2243 jenkins vulnerability CVSS: 3.5 01 Sep 2020, 14:15 UTC

Jenkins Cadence vManager Plugin 3.0.4 and earlier does not escape build descriptions in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Run/Update permission.

CVE-2020-2242 jenkins vulnerability CVSS: 4.0 01 Sep 2020, 14:15 UTC

A missing permission check in Jenkins database Plugin 1.6 and earlier allows attackers with Overall/Read access to Jenkins to connect to an attacker-specified database server using attacker-specified credentials.

CVE-2020-2241 jenkins vulnerability CVSS: 6.8 01 Sep 2020, 14:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins database Plugin 1.6 and earlier allows attackers to connect to an attacker-specified database server using attacker-specified credentials.

CVE-2020-2240 jenkins vulnerability CVSS: 6.8 01 Sep 2020, 14:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins database Plugin 1.6 and earlier allows attackers to execute arbitrary SQL scripts.

CVE-2020-2239 jenkins vulnerability CVSS: 4.0 01 Sep 2020, 14:15 UTC

Jenkins Parameterized Remote Trigger Plugin 3.1.3 and earlier stores a secret unencrypted in its global configuration file on the Jenkins controller where it can be viewed by attackers with access to the Jenkins controller file system.

CVE-2020-2238 jenkins vulnerability CVSS: 3.5 01 Sep 2020, 14:15 UTC

Jenkins Git Parameter Plugin 0.9.12 and earlier does not escape the repository field on the 'Build with Parameters' page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.

CVE-2020-2237 jenkins vulnerability CVSS: 4.3 12 Aug 2020, 14:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Flaky Test Handler Plugin 1.0.4 and earlier allows attackers to rebuild a project at a previous git revision.

CVE-2020-2236 jenkins vulnerability CVSS: 3.5 12 Aug 2020, 14:15 UTC

Jenkins Yet Another Build Visualizer Plugin 1.11 and earlier does not escape tooltip content, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by users with Run/Update permission.

CVE-2020-2235 jenkins vulnerability CVSS: 4.3 12 Aug 2020, 14:15 UTC

A cross-site request forgery (CSRF) vulnerability in Jenkins Pipeline Maven Integration Plugin 3.8.2 and earlier allows attackers to connect to an attacker-specified JDBC URL using attacker-specified credentials IDs obtained through another method, potentially capturing credentials stored in Jenkins.

CVE-2020-2234 jenkins vulnerability CVSS: 4.0 12 Aug 2020, 14:15 UTC

A missing permission check in Jenkins Pipeline Maven Integration Plugin 3.8.2 and earlier allows users with Overall/Read access to connect to an attacker-specified JDBC URL using attacker-specified credentials IDs obtained through another method, potentially capturing credentials stored in Jenkins.

CVE-2020-2233 jenkins vulnerability CVSS: 4.0 12 Aug 2020, 14:15 UTC

A missing permission check in Jenkins Pipeline Maven Integration Plugin 3.8.2 and earlier allows users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins.

CVE-2020-2232 jenkins vulnerability CVSS: 5.0 12 Aug 2020, 14:15 UTC

Jenkins Email Extension Plugin 2.72 and 2.73 transmits and displays the SMTP password in plain text as part of the global Jenkins configuration form, potentially resulting in its exposure.

CVE-2020-2231 jenkins vulnerability CVSS: 3.5 12 Aug 2020, 14:15 UTC

Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the remote address of the host starting a build via 'Trigger builds remotely', resulting in a stored cross-site scripting (XSS) vulnerability exploitable by users with Job/Configure permission or knowledge of the Authentication Token.

CVE-2020-2230 jenkins vulnerability CVSS: 3.5 12 Aug 2020, 14:15 UTC

Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the project naming strategy description, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by users with Overall/Manage permission.

CVE-2020-2229 jenkins vulnerability CVSS: 3.5 12 Aug 2020, 14:15 UTC

Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the tooltip content of help icons, resulting in a stored cross-site scripting (XSS) vulnerability.

CVE-2020-2228 jenkins vulnerability CVSS: 6.5 15 Jul 2020, 18:15 UTC

Jenkins Gitlab Authentication Plugin 1.5 and earlier does not perform group authorization checks properly, resulting in a privilege escalation vulnerability.

CVE-2020-2227 jenkins vulnerability CVSS: 3.5 15 Jul 2020, 18:15 UTC

Jenkins Deployer Framework Plugin 1.2 and earlier does not escape the URL displayed in the build home page, resulting in a stored cross-site scripting vulnerability.

CVE-2020-2226 jenkins vulnerability CVSS: 3.5 15 Jul 2020, 18:15 UTC

Jenkins Matrix Authorization Strategy Plugin 2.6.1 and earlier does not escape user names shown in the configuration, resulting in a stored cross-site scripting vulnerability.

CVE-2020-2225 jenkins vulnerability CVSS: 3.5 15 Jul 2020, 18:15 UTC

Jenkins Matrix Project Plugin 1.16 and earlier does not escape the axis names shown in tooltips on the overview page of builds with multiple axes, resulting in a stored cross-site scripting vulnerability.

CVE-2020-2224 jenkins vulnerability CVSS: 3.5 15 Jul 2020, 18:15 UTC

Jenkins Matrix Project Plugin 1.16 and earlier does not escape the node names shown in tooltips on the overview page of builds with a single axis, resulting in a stored cross-site scripting vulnerability.

CVE-2020-2223 jenkins vulnerability CVSS: 3.5 15 Jul 2020, 18:15 UTC

Jenkins 2.244 and earlier, LTS 2.235.1 and earlier does not escape correctly the 'href' attribute of links to downstream jobs displayed in the build console page, resulting in a stored cross-site scripting vulnerability.

CVE-2020-2222 jenkins vulnerability CVSS: 3.5 15 Jul 2020, 18:15 UTC

Jenkins 2.244 and earlier, LTS 2.235.1 and earlier does not escape the job name in the 'Keep this build forever' badge tooltip, resulting in a stored cross-site scripting vulnerability.

CVE-2020-2221 jenkins vulnerability CVSS: 3.5 15 Jul 2020, 18:15 UTC

Jenkins 2.244 and earlier, LTS 2.235.1 and earlier does not escape the upstream job's display name shown as part of a build cause, resulting in a stored cross-site scripting vulnerability.

CVE-2020-2220 jenkins vulnerability CVSS: 3.5 15 Jul 2020, 18:15 UTC

Jenkins 2.244 and earlier, LTS 2.235.1 and earlier does not escape the agent name in the build time trend page, resulting in a stored cross-site scripting vulnerability.

CVE-2020-2219 jenkins vulnerability CVSS: 3.5 02 Jul 2020, 15:15 UTC

Jenkins Link Column Plugin 1.0 and earlier does not filter URLs of links created by users with View/Configure permission, resulting in a stored cross-site scripting vulnerability.

CVE-2020-2216 jenkins vulnerability CVSS: 4.0 02 Jul 2020, 15:15 UTC

A missing permission check in Jenkins Zephyr for JIRA Test Management Plugin 1.5 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified username and password.

CVE-2020-2215 jenkins vulnerability CVSS: 4.3 02 Jul 2020, 15:15 UTC

A cross-site request forgery vulnerability in Jenkins Zephyr for JIRA Test Management Plugin 1.5 and earlier allows attackers to connect to an attacker-specified HTTP server using attacker-specified username and password.

CVE-2020-2214 jenkins vulnerability CVSS: 3.5 02 Jul 2020, 15:15 UTC

Jenkins ZAP Pipeline Plugin 1.9 and earlier programmatically disables Content-Security-Policy protection for user-generated content in workspaces, archived artifacts, etc. that Jenkins offers for download.

CVE-2020-2213 jenkins vulnerability CVSS: 4.0 02 Jul 2020, 15:15 UTC

Jenkins White Source Plugin 19.1.1 and earlier stores credentials unencrypted in its global configuration file and in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission (config.xml), or access to the master file system.

CVE-2020-2212 jenkins vulnerability CVSS: 4.0 02 Jul 2020, 15:15 UTC

Jenkins GitHub Coverage Reporter Plugin 1.8 and earlier stores secrets unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system or read permissions on the system configuration.

CVE-2020-2211 jenkins vulnerability CVSS: 6.5 02 Jul 2020, 15:15 UTC

Jenkins ElasticBox Jenkins Kubernetes CI/CD Plugin 1.3 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.

CVE-2020-2210 jenkins vulnerability CVSS: 4.3 02 Jul 2020, 15:15 UTC

Jenkins Stash Branch Parameter Plugin 0.3.0 and earlier transmits configured passwords in plain text as part of its global Jenkins configuration form, potentially resulting in their exposure.

CVE-2020-2209 jenkins vulnerability CVSS: 4.0 02 Jul 2020, 15:15 UTC

Jenkins TestComplete support Plugin 2.4.1 and earlier stores a password unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2020-2208 jenkins vulnerability CVSS: 4.0 02 Jul 2020, 15:15 UTC

Jenkins Slack Upload Plugin 1.7 and earlier stores a secret unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2020-2207 jenkins vulnerability CVSS: 4.3 02 Jul 2020, 15:15 UTC

Jenkins VncViewer Plugin 1.7 and earlier does not escape a parameter value in the checkVncServ form validation endpoint, resulting in a reflected cross-site scripting (XSS) vulnerability.

CVE-2020-2206 jenkins vulnerability CVSS: 4.3 02 Jul 2020, 15:15 UTC

Jenkins VncRecorder Plugin 1.25 and earlier does not escape a parameter value in the checkVncServ form validation endpoint, resulting in a reflected cross-site scripting (XSS) vulnerability.

CVE-2020-2205 jenkins vulnerability CVSS: 3.5 02 Jul 2020, 15:15 UTC

Jenkins VncRecorder Plugin 1.25 and earlier does not escape a tool path in the `checkVncServ` form validation endpoint, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by Jenkins administrators.

CVE-2020-2204 jenkins vulnerability CVSS: 5.5 02 Jul 2020, 15:15 UTC

A missing permission check in Jenkins Fortify on Demand Plugin 5.0.1 and earlier allows attackers with Overall/Read permission to connect to the globally configured Fortify on Demand endpoint using attacker-specified credentials IDs.

CVE-2020-2203 jenkins vulnerability CVSS: 4.3 02 Jul 2020, 15:15 UTC

A cross-site request forgery vulnerability in Jenkins Fortify on Demand Plugin 5.0.1 and earlier allows attackers to connect to the globally configured Fortify on Demand endpoint using attacker-specified credentials IDs.

CVE-2020-2202 jenkins vulnerability CVSS: 4.0 02 Jul 2020, 15:15 UTC

A missing permission check in Jenkins Fortify on Demand Plugin 6.0.0 and earlier in form-related methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins.

CVE-2020-2201 jenkins vulnerability CVSS: 3.5 02 Jul 2020, 15:15 UTC

Jenkins Sonargraph Integration Plugin 3.0.0 and earlier does not escape the file path for the Log file field form validation, resulting in a stored cross-site scripting vulnerability.

CVE-2020-2200 jenkins vulnerability CVSS: 6.5 03 Jun 2020, 13:15 UTC

Jenkins Play Framework Plugin 1.0.2 and earlier lets users specify the path to the `play` command on the Jenkins master for a form validation endpoint, resulting in an OS command injection vulnerability exploitable by users able to store such a file on the Jenkins master.

CVE-2020-2199 jenkins vulnerability CVSS: 4.3 03 Jun 2020, 13:15 UTC

Jenkins Subversion Partial Release Manager Plugin 1.0.1 and earlier does not escape the error message for the repository URL field form validation, resulting in a reflected cross-site scripting vulnerability.

CVE-2020-2198 jenkins vulnerability CVSS: 4.0 03 Jun 2020, 13:15 UTC

Jenkins Project Inheritance Plugin 19.08.02 and earlier does not redact encrypted secrets in the 'getConfigAsXML' API URL when transmitting job config.xml data to users without Job/Configure.

CVE-2020-2197 jenkins vulnerability CVSS: 4.0 03 Jun 2020, 13:15 UTC

Jenkins Project Inheritance Plugin 19.08.02 and earlier does not require users to have Job/ExtendedRead permission to access Inheritance Project job configurations in XML format.

CVE-2020-2196 jenkins vulnerability CVSS: 6.0 03 Jun 2020, 13:15 UTC

Jenkins Selenium Plugin 3.141.59 and earlier has no CSRF protection for its HTTP endpoints, allowing attackers to perform all administrative actions provided by the plugin.

CVE-2020-2195 jenkins vulnerability CVSS: 3.5 03 Jun 2020, 13:15 UTC

Jenkins Compact Columns Plugin 1.11 and earlier displays the unprocessed job description in tooltips, resulting in a stored cross-site scripting vulnerability that can be exploited by users with Job/Configure permission.

CVE-2020-2194 jenkins vulnerability CVSS: 3.5 03 Jun 2020, 13:15 UTC

Jenkins ECharts API Plugin 4.7.0-3 and earlier does not escape the display name of the builds in the trend chart, resulting in a stored cross-site scripting vulnerability.

CVE-2020-2193 jenkins vulnerability CVSS: 3.5 03 Jun 2020, 13:15 UTC

Jenkins ECharts API Plugin 4.7.0-3 and earlier does not escape the parser identifier when rendering charts, resulting in a stored cross-site scripting vulnerability.

CVE-2020-2192 jenkins vulnerability CVSS: 4.3 03 Jun 2020, 13:15 UTC

A cross-site request forgery vulnerability in Jenkins Self-Organizing Swarm Plug-in Modules Plugin 3.20 and earlier allows attackers to add or remove agent labels.

CVE-2020-2191 jenkins vulnerability CVSS: 4.0 03 Jun 2020, 13:15 UTC

Jenkins Self-Organizing Swarm Plug-in Modules Plugin 3.20 and earlier does not check permissions on API endpoints that allow adding and removing agent labels.

CVE-2020-2190 jenkins vulnerability CVSS: 3.5 03 Jun 2020, 13:15 UTC

Jenkins Script Security Plugin 1.72 and earlier does not correctly escape pending or approved classpath entries on the In-process Script Approval page, resulting in a stored cross-site scripting vulnerability.

CVE-2020-2189 jenkins vulnerability CVSS: 6.5 06 May 2020, 13:15 UTC

Jenkins SCM Filter Jervis Plugin 0.2.1 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.

CVE-2020-2188 jenkins vulnerability CVSS: 4.0 06 May 2020, 13:15 UTC

A missing permission check in Jenkins Amazon EC2 Plugin 1.50.1 and earlier in form-related methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins.

CVE-2020-2187 jenkins vulnerability CVSS: 6.8 06 May 2020, 13:15 UTC

Jenkins Amazon EC2 Plugin 1.50.1 and earlier unconditionally accepts self-signed certificates and does not perform hostname validation, enabling man-in-the-middle attacks.

CVE-2020-2186 jenkins vulnerability CVSS: 4.3 06 May 2020, 13:15 UTC

A cross-site request forgery vulnerability in Jenkins Amazon EC2 Plugin 1.50.1 and earlier allows attackers to provision instances.

CVE-2020-2185 jenkins vulnerability CVSS: 6.8 06 May 2020, 13:15 UTC

Jenkins Amazon EC2 Plugin 1.50.1 and earlier does not validate SSH host keys when connecting agents, enabling man-in-the-middle attacks.

CVE-2020-2184 jenkins vulnerability CVSS: 4.3 06 May 2020, 13:15 UTC

A cross-site request forgery vulnerability in Jenkins CVS Plugin 2.15 and earlier allows attackers to create and manipulate tags, and to connect to an attacker-specified URL.

CVE-2020-2183 jenkins vulnerability CVSS: 4.0 06 May 2020, 13:15 UTC

Jenkins Copy Artifact Plugin 1.43.1 and earlier performs improper permission checks, allowing attackers to copy artifacts from jobs they have no permission to access.

CVE-2020-2182 jenkins vulnerability CVSS: 4.0 06 May 2020, 13:15 UTC

Jenkins Credentials Binding Plugin 1.22 and earlier does not mask (i.e., replace with asterisks) secrets containing a `$` character in some circumstances.

CVE-2020-2181 jenkins vulnerability CVSS: 4.0 06 May 2020, 13:15 UTC

Jenkins Credentials Binding Plugin 1.22 and earlier does not mask (i.e., replace with asterisks) secrets in the build log when the build contains no build steps.

CVE-2020-2180 jenkins vulnerability CVSS: 6.5 16 Apr 2020, 19:15 UTC

Jenkins AWS SAM Plugin 1.2.2 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.

CVE-2020-2179 jenkins vulnerability CVSS: 6.5 16 Apr 2020, 19:15 UTC

Jenkins Yaml Axis Plugin 0.2.0 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.

CVE-2020-2178 jenkins vulnerability CVSS: 5.5 16 Apr 2020, 19:15 UTC

Jenkins Parasoft Findings Plugin 10.4.3 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2020-2177 jenkins vulnerability CVSS: 4.0 16 Apr 2020, 19:15 UTC

Jenkins Copr Plugin 0.3 and earlier stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2020-2176 jenkins vulnerability CVSS: 3.5 07 Apr 2020, 13:15 UTC

Multiple form validation endpoints in Jenkins useMango Runner Plugin 1.4 and earlier do not escape values received from the useMango service, resulting in a cross-site scripting (XSS) vulnerability exploitable by users able to control the values returned from the useMango service.

CVE-2020-2175 jenkins vulnerability CVSS: 3.5 07 Apr 2020, 13:15 UTC

Jenkins FitNesse Plugin 1.31 and earlier does not correctly escape report contents before showing them on the Jenkins UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by users able to control the XML input files processed by the plugin.

CVE-2020-2174 jenkins vulnerability CVSS: 4.3 07 Apr 2020, 13:15 UTC

Jenkins AWSEB Deployment Plugin 0.3.19 and earlier does not escape various values printed as part of form validation output, resulting in a reflected cross-site scripting vulnerability.

CVE-2020-2173 jenkins vulnerability CVSS: 3.5 07 Apr 2020, 13:15 UTC

Jenkins Gatling Plugin 1.2.7 and earlier prevents Content-Security-Policy headers from being set for Gatling reports served by the plugin, resulting in an XSS vulnerability exploitable by users able to change report content.

CVE-2020-2172 jenkins vulnerability CVSS: 4.0 07 Apr 2020, 13:15 UTC

Jenkins Code Coverage API Plugin 1.1.4 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2020-2171 jenkins vulnerability CVSS: 6.5 25 Mar 2020, 17:15 UTC

Jenkins RapidDeploy Plugin 4.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2020-2170 jenkins vulnerability CVSS: 3.5 25 Mar 2020, 17:15 UTC

Jenkins RapidDeploy Plugin 4.2 and earlier does not escape package names in the table of packages obtained from a remote server, resulting in a stored XSS vulnerability.

CVE-2020-2169 jenkins vulnerability CVSS: 4.3 25 Mar 2020, 17:15 UTC

A form validation endpoint in Jenkins Queue cleanup Plugin 1.3 and earlier does not properly escape a query parameter displayed in an error message, resulting in a reflected XSS vulnerability.

CVE-2020-2168 jenkins vulnerability CVSS: 6.5 25 Mar 2020, 17:15 UTC

Jenkins Azure Container Service Plugin 1.0.1 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.

CVE-2020-2167 jenkins vulnerability CVSS: 6.5 25 Mar 2020, 17:15 UTC

Jenkins OpenShift Pipeline Plugin 1.0.56 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.

CVE-2020-2166 jenkins vulnerability CVSS: 6.5 25 Mar 2020, 17:15 UTC

Jenkins Pipeline: AWS Steps Plugin 1.40 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.

CVE-2020-2163 jenkins vulnerability CVSS: 3.5 25 Mar 2020, 17:15 UTC

Jenkins 2.227 and earlier, LTS 2.204.5 and earlier improperly processes HTML content of list view column headers, resulting in a stored XSS vulnerability exploitable by users able to control column headers.

CVE-2020-2162 jenkins vulnerability CVSS: 3.5 25 Mar 2020, 17:15 UTC

Jenkins 2.227 and earlier, LTS 2.204.5 and earlier does not set Content-Security-Policy headers for files uploaded as file parameters to a build, resulting in a stored XSS vulnerability.

CVE-2020-2161 jenkins vulnerability CVSS: 3.5 25 Mar 2020, 17:15 UTC

Jenkins 2.227 and earlier, LTS 2.204.5 and earlier does not properly escape node labels that are shown in the form validation for label expressions on job configuration pages, resulting in a stored XSS vulnerability exploitable by users able to define node labels.

CVE-2020-2160 jenkins vulnerability CVSS: 6.8 25 Mar 2020, 17:15 UTC

Jenkins 2.227 and earlier, LTS 2.204.5 and earlier uses different representations of request URL paths, which allows attackers to craft URLs that allow bypassing CSRF protection of any target URL.

CVE-2020-2159 jenkins vulnerability CVSS: 9.0 09 Mar 2020, 16:15 UTC

Jenkins CryptoMove Plugin 0.1.33 and earlier allows attackers with Job/Configure access to execute arbitrary OS commands on the Jenkins master as the OS user account running Jenkins.

CVE-2020-2158 jenkins vulnerability CVSS: 6.5 09 Mar 2020, 16:15 UTC

Jenkins Literate Plugin 1.0 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.

CVE-2020-2157 jenkins vulnerability CVSS: 4.0 09 Mar 2020, 16:15 UTC

Jenkins Skytap Cloud CI Plugin 2.07 and earlier transmits configured credentials in plain text as part of job configuration forms, potentially resulting in their exposure.

CVE-2020-2156 jenkins vulnerability CVSS: 4.0 09 Mar 2020, 16:15 UTC

Jenkins DeployHub Plugin 8.0.14 and earlier transmits configured credentials in plain text as part of job configuration forms, potentially resulting in their exposure.

CVE-2020-2155 jenkins vulnerability CVSS: 5.0 09 Mar 2020, 16:15 UTC

Jenkins OpenShift Deployer Plugin 1.2.0 and earlier transmits configured credentials in plain text as part of its global Jenkins configuration form, potentially resulting in their exposure.

CVE-2020-2154 jenkins vulnerability CVSS: 2.1 09 Mar 2020, 16:15 UTC

Jenkins Zephyr for JIRA Test Management Plugin 1.5 and earlier stores its credentials in plain text in a global configuration file on the Jenkins master file system.

CVE-2020-2153 jenkins vulnerability CVSS: 4.0 09 Mar 2020, 16:15 UTC

Jenkins Backlog Plugin 2.4 and earlier transmits configured credentials in plain text as part of job configuration forms, potentially resulting in their exposure.

CVE-2020-2152 jenkins vulnerability CVSS: 4.3 09 Mar 2020, 16:15 UTC

Jenkins Subversion Release Manager Plugin 1.2 and earlier does not escape the error message for the Repository URL field form validation, resulting in a reflected cross-site scripting vulnerability.

CVE-2020-2151 jenkins vulnerability CVSS: 5.0 09 Mar 2020, 16:15 UTC

Jenkins Quality Gates Plugin 2.5 and earlier transmits configured credentials in plain text as part of its global Jenkins configuration form, potentially resulting in their exposure.

CVE-2020-2150 jenkins vulnerability CVSS: 5.0 09 Mar 2020, 16:15 UTC

Jenkins Sonar Quality Gates Plugin 1.3.1 and earlier transmits configured credentials in plain text as part of its global Jenkins configuration form, potentially resulting in their exposure.

CVE-2020-2149 jenkins vulnerability CVSS: 5.0 09 Mar 2020, 16:15 UTC

Jenkins Repository Connector Plugin 1.2.6 and earlier transmits configured credentials in plain text as part of its global Jenkins configuration form, potentially resulting in their exposure.

CVE-2020-2148 jenkins vulnerability CVSS: 4.0 09 Mar 2020, 16:15 UTC

A missing permission check in Jenkins Mac Plugin 1.1.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified credentials.

CVE-2020-2147 jenkins vulnerability CVSS: 4.3 09 Mar 2020, 16:15 UTC

A cross-site request forgery vulnerability in Jenkins Mac Plugin 1.1.0 and earlier allows attackers to connect to an attacker-specified SSH server using attacker-specified credentials.

CVE-2020-2146 jenkins vulnerability CVSS: 5.8 09 Mar 2020, 16:15 UTC

Jenkins Mac Plugin 1.1.0 and earlier does not validate SSH host keys when connecting agents created by the plugin, enabling man-in-the-middle attacks.

CVE-2020-2145 jenkins vulnerability CVSS: 2.1 09 Mar 2020, 16:15 UTC

Jenkins Zephyr Enterprise Test Management Plugin 1.9.1 and earlier stores its Zephyr password in plain text on the Jenkins master file system.

CVE-2020-2144 jenkins vulnerability CVSS: 5.5 09 Mar 2020, 16:15 UTC

Jenkins Rundeck Plugin 3.6.6 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2020-2143 jenkins vulnerability CVSS: 5.0 09 Mar 2020, 16:15 UTC

Jenkins Logstash Plugin 2.3.1 and earlier transmits configured credentials in plain text as part of its global Jenkins configuration form, potentially resulting in their exposure.

CVE-2020-2142 jenkins vulnerability CVSS: 4.0 09 Mar 2020, 16:15 UTC

A missing permission check in Jenkins P4 Plugin 1.10.10 and earlier allows attackers with Overall/Read permission to trigger builds.

CVE-2020-2141 jenkins vulnerability CVSS: 4.3 09 Mar 2020, 16:15 UTC

A cross-site request forgery vulnerability in Jenkins P4 Plugin 1.10.10 and earlier allows attackers to trigger builds or add a labels in Perforce.

CVE-2020-2140 jenkins vulnerability CVSS: 4.3 09 Mar 2020, 16:15 UTC

Jenkins Audit Trail Plugin 3.2 and earlier does not escape the error message for the URL Patterns field form validation, resulting in a reflected cross-site scripting vulnerability.

CVE-2020-2139 jenkins vulnerability CVSS: 8.5 09 Mar 2020, 16:15 UTC

An arbitrary file write vulnerability in Jenkins Cobertura Plugin 1.15 and earlier allows attackers able to control the coverage report file contents to overwrite any file on the Jenkins master file system.

CVE-2020-2138 jenkins vulnerability CVSS: 5.5 09 Mar 2020, 16:15 UTC

Jenkins Cobertura Plugin 1.15 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

CVE-2020-2137 jenkins vulnerability CVSS: 3.5 09 Mar 2020, 16:15 UTC

Jenkins Timestamper Plugin 1.11.1 and earlier does not sanitize HTML formatting of its output, resulting in a stored XSS vulnerability exploitable by attackers with Overall/Administer permission.

CVE-2020-2136 jenkins vulnerability CVSS: 3.5 09 Mar 2020, 16:15 UTC

Jenkins Git Plugin 4.2.0 and earlier does not escape the error message for the repository URL for Microsoft TFS field form validation, resulting in a stored cross-site scripting vulnerability.

CVE-2020-2135 jenkins vulnerability CVSS: 6.5 09 Mar 2020, 16:15 UTC

Sandbox protection in Jenkins Script Security Plugin 1.70 and earlier could be circumvented through crafted method calls on objects that implement GroovyInterceptable.

CVE-2020-2134 jenkins vulnerability CVSS: 6.5 09 Mar 2020, 16:15 UTC

Sandbox protection in Jenkins Script Security Plugin 1.70 and earlier could be circumvented through crafted constructor calls and crafted constructor bodies.

CVE-2012-0785 jenkins vulnerability CVSS: 7.8 24 Feb 2020, 17:15 UTC

Hash collision attack vulnerability in Jenkins before 1.447, Jenkins LTS before 1.424.2, and Jenkins Enterprise by CloudBees 1.424.x before 1.424.2.1 and 1.400.x before 1.400.0.11 could allow remote attackers to cause a considerable CPU load, aka "the Hash DoS attack."

CVE-2020-2133 jenkins vulnerability CVSS: 4.0 12 Feb 2020, 15:15 UTC

Jenkins Applatix Plugin 1.1 and earlier stores a password unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2020-2132 jenkins vulnerability CVSS: 4.0 12 Feb 2020, 15:15 UTC

Jenkins Parasoft Environment Manager Plugin 2.14 and earlier stores a password unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2020-2131 jenkins vulnerability CVSS: 4.0 12 Feb 2020, 15:15 UTC

Jenkins Harvest SCM Plugin 0.5.1 and earlier stores passwords unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2020-2130 jenkins vulnerability CVSS: 4.0 12 Feb 2020, 15:15 UTC

Jenkins Harvest SCM Plugin 0.5.1 and earlier stores a password unencrypted in its global configuration file on the Jenkins master where it can be viewed by users with access to the master file system.

CVE-2020-2129 jenkins vulnerability CVSS: 4.0 12 Feb 2020, 15:15 UTC

Jenkins Eagle Tester Plugin 1.0.9 and earlier stores a password unencrypted in its global configuration file on the Jenkins master where it can be viewed by users with access to the master file system.

CVE-2020-2128 jenkins vulnerability CVSS: 4.0 12 Feb 2020, 15:15 UTC

Jenkins ECX Copy Data Management Plugin 1.9 and earlier stores a password unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2020-2127 jenkins vulnerability CVSS: 4.0 12 Feb 2020, 15:15 UTC

Jenkins BMC Release Package and Deployment Plugin 1.1 and earlier stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2020-2126 jenkins vulnerability CVSS: 4.0 12 Feb 2020, 15:15 UTC

Jenkins DigitalOcean Plugin 1.1 and earlier stores a token unencrypted in the global config.xml file on the Jenkins master where it can be viewed by users with access to the master file system.

CVE-2020-2125 jenkins vulnerability CVSS: 4.0 12 Feb 2020, 15:15 UTC

Jenkins Debian Package Builder Plugin 1.6.11 and earlier stores a GPG passphrase unencrypted in its global configuration file on the Jenkins master where it can be viewed by users with access to the master file system.

CVE-2020-2124 jenkins vulnerability CVSS: 4.0 12 Feb 2020, 15:15 UTC

Jenkins Dynamic Extended Choice Parameter Plugin 1.0.1 and earlier stores a password unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2020-2123 jenkins vulnerability CVSS: 6.5 12 Feb 2020, 15:15 UTC

Jenkins RadarGun Plugin 1.7 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.

CVE-2020-2122 jenkins vulnerability CVSS: 3.5 12 Feb 2020, 15:15 UTC

Jenkins Brakeman Plugin 0.12 and earlier did not escape values received from parsed JSON files when rendering them, resulting in a stored cross-site scripting vulnerability exploitable by users able to control the Brakeman post-build step input data.

CVE-2020-2121 jenkins vulnerability CVSS: 6.5 12 Feb 2020, 15:15 UTC

Jenkins Google Kubernetes Engine Plugin 0.8.0 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.

CVE-2020-2120 jenkins vulnerability CVSS: 6.5 12 Feb 2020, 15:15 UTC

Jenkins FitNesse Plugin 1.30 and earlier does not configure the XML parser to prevent XML external entity (XXE) attacks.

CVE-2020-2119 jenkins vulnerability CVSS: 5.0 12 Feb 2020, 15:15 UTC

Jenkins Azure AD Plugin 1.1.2 and earlier transmits configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.

CVE-2020-2118 jenkins vulnerability CVSS: 4.0 12 Feb 2020, 15:15 UTC

A missing permission check in Jenkins Pipeline GitHub Notify Step Plugin 1.0.4 and earlier in form-related methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins.

CVE-2020-2117 jenkins vulnerability CVSS: 4.0 12 Feb 2020, 15:15 UTC

A missing permission check in Jenkins Pipeline GitHub Notify Step Plugin 1.0.4 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2020-2116 jenkins vulnerability CVSS: 6.8 12 Feb 2020, 15:15 UTC

A cross-site request forgery vulnerability in Jenkins Pipeline GitHub Notify Step Plugin 1.0.4 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2020-2115 jenkins vulnerability CVSS: 6.5 12 Feb 2020, 15:15 UTC

Jenkins NUnit Plugin 0.25 and earlier does not configure the XML parser to prevent XML external entity (XXE) attacks.

CVE-2020-2114 jenkins vulnerability CVSS: 5.0 12 Feb 2020, 15:15 UTC

Jenkins S3 publisher Plugin 0.11.4 and earlier transmits configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.

CVE-2020-2113 jenkins vulnerability CVSS: 3.5 12 Feb 2020, 15:15 UTC

Jenkins Git Parameter Plugin 0.9.11 and earlier does not escape the default value shown on the UI, resulting in a stored cross-site scripting vulnerability exploitable by users with Job/Configure permission.

CVE-2020-2112 jenkins vulnerability CVSS: 3.5 12 Feb 2020, 15:15 UTC

Jenkins Git Parameter Plugin 0.9.11 and earlier does not escape the parameter name shown on the UI, resulting in a stored cross-site scripting vulnerability exploitable by users with Job/Configure permission.

CVE-2020-2111 jenkins vulnerability CVSS: 3.5 12 Feb 2020, 15:15 UTC

Jenkins Subversion Plugin 2.13.0 and earlier does not escape the error message for the Project Repository Base URL field form validation, resulting in a stored cross-site scripting vulnerability.

CVE-2020-2110 jenkins vulnerability CVSS: 6.5 12 Feb 2020, 15:15 UTC

Sandbox protection in Jenkins Script Security Plugin 1.69 and earlier could be circumvented during the script compilation phase by applying AST transforming annotations to imports or by using them inside of other annotations.

CVE-2020-2109 jenkins vulnerability CVSS: 6.5 12 Feb 2020, 15:15 UTC

Sandbox protection in Jenkins Pipeline: Groovy Plugin 2.78 and earlier can be circumvented through default parameter expressions in CPS-transformed methods.

CVE-2020-2108 jenkins vulnerability CVSS: 6.5 29 Jan 2020, 16:15 UTC

Jenkins WebSphere Deployer Plugin 1.6.1 and earlier does not configure the XML parser to prevent XXE attacks which can be exploited by a user with Job/Configure permissions.

CVE-2020-2107 jenkins vulnerability CVSS: 4.0 29 Jan 2020, 16:15 UTC

Jenkins Fortify Plugin 19.1.29 and earlier stores proxy server passwords unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2020-2106 jenkins vulnerability CVSS: 3.5 29 Jan 2020, 16:15 UTC

Jenkins Code Coverage API Plugin 1.1.2 and earlier does not escape the filename of the coverage report used in its view, resulting in a stored XSS vulnerability exploitable by users able to change job configurations.

CVE-2020-2105 jenkins vulnerability CVSS: 4.3 29 Jan 2020, 16:15 UTC

REST API endpoints in Jenkins 2.218 and earlier, LTS 2.204.1 and earlier were vulnerable to clickjacking attacks.

CVE-2020-2104 jenkins vulnerability CVSS: 4.0 29 Jan 2020, 16:15 UTC

Jenkins 2.218 and earlier, LTS 2.204.1 and earlier allowed users with Overall/Read access to view a JVM memory usage chart.

CVE-2020-2103 jenkins vulnerability CVSS: 4.0 29 Jan 2020, 16:15 UTC

Jenkins 2.218 and earlier, LTS 2.204.1 and earlier exposed session identifiers on a user's detail object in the whoAmI diagnostic page.

CVE-2020-2102 jenkins vulnerability CVSS: 3.5 29 Jan 2020, 16:15 UTC

Jenkins 2.218 and earlier, LTS 2.204.1 and earlier used a non-constant time comparison function when validating an HMAC.

CVE-2020-2101 jenkins vulnerability CVSS: 3.5 29 Jan 2020, 16:15 UTC

Jenkins 2.218 and earlier, LTS 2.204.1 and earlier did not use a constant-time comparison function for validating connection secrets, which could potentially allow an attacker to use a timing attack to obtain this secret.

CVE-2020-2100 jenkins vulnerability CVSS: 5.0 29 Jan 2020, 16:15 UTC

Jenkins 2.218 and earlier, LTS 2.204.1 and earlier was vulnerable to a UDP amplification reflection denial of service attack on port 33848.

CVE-2020-2099 jenkins vulnerability CVSS: 7.5 29 Jan 2020, 16:15 UTC

Jenkins 2.213 and earlier, LTS 2.204.1 and earlier improperly reuses encryption key parameters in the Inbound TCP Agent Protocol/3, allowing unauthorized attackers with knowledge of agent names to obtain the connection secrets for those agents, which can be used to connect to Jenkins, impersonating those agents.

CVE-2015-1811 jenkins vulnerability CVSS: 5.0 15 Jan 2020, 19:15 UTC

XML external entity (XXE) vulnerability in CloudBees Jenkins before 1.600 and LTS before 1.596.1 allows remote attackers to read arbitrary XML files via a crafted XML document.

CVE-2015-1809 jenkins vulnerability CVSS: 5.0 15 Jan 2020, 19:15 UTC

XML external entity (XXE) vulnerability in CloudBees Jenkins before 1.600 and LTS before 1.596.1 allows remote attackers to read arbitrary XML files via an XPath query.

CVE-2020-2098 jenkins vulnerability CVSS: 9.3 15 Jan 2020, 16:15 UTC

A cross-site request forgery vulnerability in Jenkins Sounds Plugin 0.5 and earlier allows attacker to execute arbitrary OS commands as the OS user account running Jenkins.

CVE-2020-2097 jenkins vulnerability CVSS: 6.5 15 Jan 2020, 16:15 UTC

Jenkins Sounds Plugin 0.5 and earlier does not perform permission checks in URLs performing form validation, allowing attackers with Overall/Read access to execute arbitrary OS commands as the OS user account running Jenkins.

CVE-2020-2096 jenkins vulnerability CVSS: 4.3 15 Jan 2020, 16:15 UTC

Jenkins Gitlab Hook Plugin 1.4.2 and earlier does not escape project names in the build_now endpoint, resulting in a reflected XSS vulnerability.

CVE-2020-2095 jenkins vulnerability CVSS: 4.0 15 Jan 2020, 16:15 UTC

Jenkins Redgate SQL Change Automation Plugin 2.0.4 and earlier stored an API key unencrypted in job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system.

CVE-2020-2094 jenkins vulnerability CVSS: 4.0 15 Jan 2020, 16:15 UTC

A missing permission check in Jenkins Health Advisor by CloudBees Plugin 3.0 and earlier allows attackers with Overall/Read permission to send a fixed email to an attacker-specific recipient.

CVE-2020-2093 jenkins vulnerability CVSS: 6.8 15 Jan 2020, 16:15 UTC

A cross-site request forgery vulnerability in Jenkins Health Advisor by CloudBees Plugin 3.0 and earlier allows attackers to send an email with fixed content to an attacker-specified recipient.

CVE-2020-2092 jenkins vulnerability CVSS: 6.5 15 Jan 2020, 16:15 UTC

Jenkins Robot Framework Plugin 2.0.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks, allowing users with Job/Configure to have Jenkins parse crafted XML documents.

CVE-2020-2091 jenkins vulnerability CVSS: 5.5 15 Jan 2020, 16:15 UTC

A missing permission check in Jenkins Amazon EC2 Plugin 1.47 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL within the AWS region using attacker-specified credentials IDs obtained through another method.

CVE-2020-2090 jenkins vulnerability CVSS: 6.8 15 Jan 2020, 16:15 UTC

A cross-site request forgery vulnerability in Jenkins Amazon EC2 Plugin 1.47 and earlier allows attackers to connect to an attacker-specified URL within the AWS region using attacker-specified credentials IDs obtained through another method.

CVE-2019-16576 jenkins vulnerability CVSS: 4.0 17 Dec 2019, 15:15 UTC

A missing permission check in Jenkins Alauda Kubernetes Suport Plugin 2.3.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing the Kubernetes service account token or credentials stored in Jenkins.

CVE-2019-16575 jenkins vulnerability CVSS: 6.8 17 Dec 2019, 15:15 UTC

A cross-site request forgery vulnerability in Jenkins Alauda Kubernetes Suport Plugin 2.3.0 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing the Kubernetes service account token or credentials stored in Jenkins.

CVE-2019-16574 jenkins vulnerability CVSS: 4.0 17 Dec 2019, 15:15 UTC

A missing permission check in Jenkins Alauda DevOps Pipeline Plugin 2.3.2 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2019-16573 jenkins vulnerability CVSS: 6.8 17 Dec 2019, 15:15 UTC

A cross-site request forgery vulnerability in Jenkins Alauda DevOps Pipeline Plugin 2.3.2 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2019-16572 jenkins vulnerability CVSS: 2.1 17 Dec 2019, 15:15 UTC

Jenkins Weibo Plugin 1.0.1 and earlier stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-16571 jenkins vulnerability CVSS: 4.0 17 Dec 2019, 15:15 UTC

A missing permission check in Jenkins RapidDeploy Plugin 4.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified web server.

CVE-2019-16570 jenkins vulnerability CVSS: 6.8 17 Dec 2019, 15:15 UTC

A cross-site request forgery vulnerability in Jenkins RapidDeploy Plugin 4.1 and earlier allows attackers to connect to an attacker-specified web server.

CVE-2019-16569 jenkins vulnerability CVSS: 4.3 17 Dec 2019, 15:15 UTC

A cross-site request forgery vulnerability in Jenkins Mantis Plugin 0.26 and earlier allows attackers to connect to an attacker-specified web server using attacker-specified credentials.

CVE-2019-16568 jenkins vulnerability CVSS: 5.0 17 Dec 2019, 15:15 UTC

Jenkins SCTMExecutor Plugin 2.2 and earlier transmits previously configured service credentials in plain text as part of the global configuration, as well as individual jobs' configurations.

CVE-2019-16567 jenkins vulnerability CVSS: 4.0 17 Dec 2019, 15:15 UTC

A missing permission check in Jenkins Team Concert Plugin 1.3.0 and earlier in form-related methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins.

CVE-2019-16566 jenkins vulnerability CVSS: 4.0 17 Dec 2019, 15:15 UTC

A missing permission check in Jenkins Team Concert Plugin 1.3.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2019-16565 jenkins vulnerability CVSS: 6.8 17 Dec 2019, 15:15 UTC

A cross-site request forgery vulnerability in Jenkins Team Concert Plugin 1.3.0 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2019-16564 jenkins vulnerability CVSS: 3.5 17 Dec 2019, 15:15 UTC

Jenkins Pipeline Aggregator View Plugin 1.8 and earlier does not escape information shown on its view, resulting in a stored XSS vulnerability exploitable by attackers able to affects view content such as job display name or pipeline stage names.

CVE-2019-16563 jenkins vulnerability CVSS: 3.5 17 Dec 2019, 15:15 UTC

Jenkins Mission Control Plugin 0.9.16 and earlier does not escape job display names and build names shown on its view, resulting in a stored XSS vulnerability exploitable by attackers able to change these properties.

CVE-2019-16562 jenkins vulnerability CVSS: 3.5 17 Dec 2019, 15:15 UTC

Jenkins buildgraph-view Plugin 1.8 and earlier does not escape the description of builds shown in its view, resulting in a stored XSS vulnerability exploitable by users able to change build descriptions.

CVE-2019-16561 jenkins vulnerability CVSS: 5.5 17 Dec 2019, 15:15 UTC

Jenkins WebSphere Deployer Plugin 1.6.1 and earlier allows users with Overall/Read access to disable SSL/TLS certificate and hostname validation for the entire Jenkins master JVM.

CVE-2019-16560 jenkins vulnerability CVSS: 6.8 17 Dec 2019, 15:15 UTC

A cross-site request forgery vulnerability in Jenkins WebSphere Deployer Plugin 1.6.1 and earlier allows attackers to perform connection tests and determine whether files with an attacker-specified path exist on the Jenkins master file system.

CVE-2019-16559 jenkins vulnerability CVSS: 5.5 17 Dec 2019, 15:15 UTC

A missing permission check in Jenkins WebSphere Deployer Plugin 1.6.1 and earlier allows attackers with Overall/Read permission to perform connection tests and determine whether files with an attacker-specified path exist on the Jenkins master file system.

CVE-2019-16558 jenkins vulnerability CVSS: 6.4 17 Dec 2019, 15:15 UTC

Jenkins Spira Importer Plugin 3.2.3 and earlier disables SSL/TLS certificate validation for the Jenkins master JVM.

CVE-2019-16557 jenkins vulnerability CVSS: 4.0 17 Dec 2019, 15:15 UTC

Jenkins Redgate SQL Change Automation Plugin 2.0.3 and earlier stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-16556 jenkins vulnerability CVSS: 4.0 17 Dec 2019, 15:15 UTC

Jenkins Rundeck Plugin 3.6.5 and earlier stores credentials unencrypted in its global configuration file and in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-16555 jenkins vulnerability CVSS: 4.0 17 Dec 2019, 15:15 UTC

A user-supplied regular expression in Jenkins Build Failure Analyzer Plugin 1.24.1 and earlier was processed in a way that wasn't interruptible, allowing attackers to have Jenkins evaluate a regular expression without the ability to interrupt this process.

CVE-2019-16554 jenkins vulnerability CVSS: 4.0 17 Dec 2019, 15:15 UTC

A missing permission check in Jenkins Build Failure Analyzer Plugin 1.24.1 and earlier allows attackers with Overall/Read permission to have Jenkins evaluate a computationally expensive regular expression.

CVE-2019-16553 jenkins vulnerability CVSS: 6.8 17 Dec 2019, 15:15 UTC

A cross-site request forgery vulnerability in Jenkins Build Failure Analyzer Plugin 1.24.1 and earlier allows attackers to have Jenkins evaluate a computationally expensive regular expression.

CVE-2019-16552 jenkins vulnerability CVSS: 5.5 17 Dec 2019, 15:15 UTC

A missing permission check in Jenkins Gerrit Trigger Plugin 2.30.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified HTTP URL or SSH server using attacker-specified credentials, or determine the existence of a file with a given path on the Jenkins master.

CVE-2019-16551 jenkins vulnerability CVSS: 6.8 17 Dec 2019, 15:15 UTC

A cross-site request forgery vulnerability in Jenkins Gerrit Trigger Plugin 2.30.1 and earlier allows attackers to connect to an attacker-specified HTTP URL or SSH server using attacker-specified credentials.

CVE-2019-16550 jenkins vulnerability CVSS: 6.8 17 Dec 2019, 15:15 UTC

A cross-site request forgery vulnerability in a connection test form method in Jenkins Maven Release Plugin 0.16.1 and earlier allows attackers to have Jenkins connect to an attacker specified web server and parse XML documents.

CVE-2019-16549 jenkins vulnerability CVSS: 6.8 17 Dec 2019, 15:15 UTC

Jenkins Maven Release Plugin 0.16.1 and earlier does not configure the XML parser to prevent XML external entity (XXE) attacks, allowing man-in-the-middle attackers to have Jenkins parse crafted XML documents.

CVE-2019-16548 jenkins vulnerability CVSS: 6.8 21 Nov 2019, 15:15 UTC

A cross-site request forgery vulnerability in Jenkins Google Compute Engine Plugin 4.1.1 and earlier in ComputeEngineCloud#doProvision could be used to provision new agents.

CVE-2019-16547 jenkins vulnerability CVSS: 4.0 21 Nov 2019, 15:15 UTC

Missing permission checks in various API endpoints in Jenkins Google Compute Engine Plugin 4.1.1 and earlier allow attackers with Overall/Read permission to obtain limited information about the plugin configuration and environment.

CVE-2019-16546 jenkins vulnerability CVSS: 4.3 21 Nov 2019, 15:15 UTC

Jenkins Google Compute Engine Plugin 4.1.1 and earlier does not verify SSH host keys when connecting agents created by the plugin, enabling man-in-the-middle attacks.

CVE-2019-16543 jenkins vulnerability CVSS: 2.1 21 Nov 2019, 15:15 UTC

Jenkins Spira Importer Plugin 3.2.2 and earlier stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-16542 jenkins vulnerability CVSS: 4.0 21 Nov 2019, 15:15 UTC

Jenkins Anchore Container Image Scanner Plugin 1.0.19 and earlier stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-16541 jenkins vulnerability CVSS: 6.5 21 Nov 2019, 15:15 UTC

Jenkins JIRA Plugin 3.0.10 and earlier does not declare the correct (folder) scope for per-folder Jira site definitions, allowing users to select and use credentials with System scope.

CVE-2019-16540 jenkins vulnerability CVSS: 5.5 21 Nov 2019, 15:15 UTC

A path traversal vulnerability in Jenkins Support Core Plugin 2.63 and earlier allows attackers with Overall/Read permission to delete arbitrary files on the Jenkins master.

CVE-2019-16539 jenkins vulnerability CVSS: 5.5 21 Nov 2019, 15:15 UTC

A missing permission check in Jenkins Support Core Plugin 2.63 and earlier allows attackers with Overall/Read permission to delete support bundles.

CVE-2019-16538 jenkins vulnerability CVSS: 6.5 21 Nov 2019, 15:15 UTC

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.67 and earlier related to the handling of default parameter expressions in closures allowed attackers to execute arbitrary code in sandboxed scripts.

CVE-2012-4441 jenkins vulnerability CVSS: 4.3 18 Nov 2019, 22:15 UTC

Cross-site Scripting (XSS) in Jenkins main before 1.482 and LTS before 1.466.2 allows remote attackers to inject arbitrary web script or HTML in the CI game plugin.

CVE-2012-4440 jenkins vulnerability CVSS: 4.3 18 Nov 2019, 22:15 UTC

Cross-site Scripting (XSS) in Jenkins main before 1.482 and LTS before 1.466.2 allows remote attackers to inject arbitrary web script or HTML in the Violations plugin.

CVE-2012-4439 jenkins vulnerability CVSS: 4.3 18 Nov 2019, 21:15 UTC

Cross-site Scripting (XSS) in Jenkins main before 1.482 and LTS before 1.466.2 allows remote attackers to inject arbitrary web script or HTML via a crafted URL that points to Jenkins.

CVE-2012-4438 jenkins vulnerability CVSS: 6.5 18 Nov 2019, 21:15 UTC

Jenkins main before 1.482 and LTS before 1.466.2 allows remote attackers with read access and HTTP access to Jenkins master to insert data and execute arbitrary code.

CVE-2019-10476 jenkins vulnerability CVSS: 2.1 23 Oct 2019, 13:15 UTC

Jenkins Zulip Plugin 1.1.0 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.

CVE-2019-10475 jenkins vulnerability CVSS: 4.3 23 Oct 2019, 13:15 UTC

A reflected cross-site scripting vulnerability in Jenkins build-metrics Plugin allows attackers to inject arbitrary HTML and JavaScript into web pages provided by this plugin.

CVE-2019-10474 jenkins vulnerability CVSS: 4.0 23 Oct 2019, 13:15 UTC

A missing permission check in Jenkins Global Post Script Plugin in allowed users with Overall/Read access to list the scripts available to the plugin stored on the Jenkins master file system.

CVE-2019-10473 jenkins vulnerability CVSS: 4.0 23 Oct 2019, 13:15 UTC

A missing permission check in Jenkins Libvirt Slaves Plugin in form-related methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins.

CVE-2019-10472 jenkins vulnerability CVSS: 4.0 23 Oct 2019, 13:15 UTC

A missing permission check in Jenkins Libvirt Slaves Plugin allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2019-10471 jenkins vulnerability CVSS: 6.8 23 Oct 2019, 13:15 UTC

A cross-site request forgery vulnerability in Jenkins Libvirt Slaves Plugin allows attackers to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2019-10470 jenkins vulnerability CVSS: 4.0 23 Oct 2019, 13:15 UTC

A missing permission check in Jenkins ElasticBox Jenkins Kubernetes CI/CD Plugin in form-related methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins.

CVE-2019-10469 jenkins vulnerability CVSS: 4.0 23 Oct 2019, 13:15 UTC

A missing permission check in Jenkins ElasticBox Jenkins Kubernetes CI/CD Plugin allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2019-10468 jenkins vulnerability CVSS: 6.8 23 Oct 2019, 13:15 UTC

A cross-site request forgery vulnerability in Jenkins ElasticBox Jenkins Kubernetes CI/CD Plugin allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2019-10467 jenkins vulnerability CVSS: 4.0 23 Oct 2019, 13:15 UTC

Jenkins Sonar Gerrit Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-10466 jenkins vulnerability CVSS: 5.5 23 Oct 2019, 13:15 UTC

An XML external entities (XXE) vulnerability in Jenkins 360 FireLine Plugin allows attackers with Overall/Read access to have Jenkins resolve external entities, resulting in the extraction of secrets from the Jenkins agent, server-side request forgery, or denial-of-service attacks.

CVE-2019-10465 jenkins vulnerability CVSS: 4.0 23 Oct 2019, 13:15 UTC

A missing permission check in Jenkins Deploy WebLogic Plugin allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials, or determine whether a file or directory with an attacker-specified path exists on the Jenkins master file system.

CVE-2019-10464 jenkins vulnerability CVSS: 6.8 23 Oct 2019, 13:15 UTC

A cross-site request forgery vulnerability in Jenkins Deploy WebLogic Plugin allows attackers to connect to an attacker-specified URL using attacker-specified credentials, or determine whether a file or directory with an attacker-specified path exists on the Jenkins master file system.

CVE-2019-10463 jenkins vulnerability CVSS: 4.0 23 Oct 2019, 13:15 UTC

A missing permission check in Jenkins Dynatrace Application Monitoring Plugin allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.

CVE-2019-10462 jenkins vulnerability CVSS: 6.8 23 Oct 2019, 13:15 UTC

A cross-site request forgery vulnerability in Jenkins Dynatrace Application Monitoring Plugin 2.1.3 and earlier allowed attackers to connect to an attacker-specified URL using attacker-specified credentials.

CVE-2019-10461 jenkins vulnerability CVSS: 2.1 23 Oct 2019, 13:15 UTC

Jenkins Dynatrace Application Monitoring Plugin 2.1.3 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.

CVE-2019-10460 jenkins vulnerability CVSS: 2.1 23 Oct 2019, 13:15 UTC

Jenkins Bitbucket OAuth Plugin 0.9 and earlier stored credentials unencrypted in the global config.xml configuration file on the Jenkins master where they could be viewed by users with access to the master file system.

CVE-2019-10459 jenkins vulnerability CVSS: 4.0 23 Oct 2019, 13:15 UTC

Jenkins Mattermost Notification Plugin 2.7.0 and earlier stored webhook URLs containing a secret token unencrypted in its global configuration file and job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-10458 jenkins vulnerability CVSS: 6.5 16 Oct 2019, 14:15 UTC

Jenkins Puppet Enterprise Pipeline 1.3.1 and earlier specifies unsafe values in its custom Script Security whitelist, allowing attackers able to execute Script Security protected scripts to execute arbitrary code.

CVE-2019-10457 jenkins vulnerability CVSS: 4.0 16 Oct 2019, 14:15 UTC

A missing permission check in Jenkins Oracle Cloud Infrastructure Compute Classic Plugin allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.

CVE-2019-10456 jenkins vulnerability CVSS: 4.3 16 Oct 2019, 14:15 UTC

A cross-site request forgery vulnerability in Jenkins Oracle Cloud Infrastructure Compute Classic Plugin allows attackers to connect to an attacker-specified URL using attacker-specified credentials.

CVE-2019-10455 jenkins vulnerability CVSS: 4.0 16 Oct 2019, 14:15 UTC

A missing permission check in Jenkins Rundeck Plugin allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.

CVE-2019-10454 jenkins vulnerability CVSS: 4.3 16 Oct 2019, 14:15 UTC

A cross-site request forgery vulnerability in Jenkins Rundeck Plugin allows attackers to connect to an attacker-specified URL using attacker-specified credentials.

CVE-2019-10453 jenkins vulnerability CVSS: 2.1 16 Oct 2019, 14:15 UTC

Jenkins Delphix Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-10452 jenkins vulnerability CVSS: 4.0 16 Oct 2019, 14:15 UTC

Jenkins View26 Test-Reporting Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-10451 jenkins vulnerability CVSS: 4.0 16 Oct 2019, 14:15 UTC

Jenkins SOASTA CloudTest Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-10450 jenkins vulnerability CVSS: 2.1 16 Oct 2019, 14:15 UTC

Jenkins ElasticBox CI Plugin stores credentials unencrypted in the global config.xml configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-10449 jenkins vulnerability CVSS: 4.0 16 Oct 2019, 14:15 UTC

Jenkins Fortify on Demand Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-10448 jenkins vulnerability CVSS: 4.0 16 Oct 2019, 14:15 UTC

Jenkins Extensive Testing Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-10447 jenkins vulnerability CVSS: 4.0 16 Oct 2019, 14:15 UTC

Jenkins Sofy.AI Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-10446 jenkins vulnerability CVSS: 6.4 16 Oct 2019, 14:15 UTC

Jenkins Cadence vManager Plugin 2.7.0 and earlier disabled SSL/TLS and hostname verification globally for the Jenkins master JVM.

CVE-2019-10445 jenkins vulnerability CVSS: 4.0 16 Oct 2019, 14:15 UTC

A missing permission check in Jenkins Google Kubernetes Engine Plugin 0.7.0 and earlier allowed attackers with Overall/Read permission to obtain limited information about the scope of a credential with an attacker-specified credentials ID.

CVE-2019-10444 jenkins vulnerability CVSS: 6.4 16 Oct 2019, 14:15 UTC

Jenkins Bumblebee HP ALM Plugin 4.1.3 and earlier unconditionally disabled SSL/TLS and hostname verification for connections to HP ALM.

CVE-2019-10443 jenkins vulnerability CVSS: 4.0 16 Oct 2019, 14:15 UTC

Jenkins iceScrum Plugin 1.1.4 and earlier stored credentials unencrypted in job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-10442 jenkins vulnerability CVSS: 4.0 16 Oct 2019, 14:15 UTC

A missing permission check in Jenkins iceScrum Plugin 1.1.5 and earlier allowed attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.

CVE-2019-10441 jenkins vulnerability CVSS: 4.3 16 Oct 2019, 14:15 UTC

A cross-site request forgery vulnerability in Jenkins iceScrum Plugin 1.1.5 and earlier allowed attackers to connect to an attacker-specified URL using attacker-specified credentials.

CVE-2019-10440 jenkins vulnerability CVSS: 4.0 16 Oct 2019, 14:15 UTC

Jenkins NeoLoad Plugin 2.2.5 and earlier stored credentials unencrypted in its global configuration file and in job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-10439 jenkins vulnerability CVSS: 4.0 16 Oct 2019, 14:15 UTC

A missing permission check in Jenkins CRX Content Package Deployer Plugin 1.8.1 and earlier in various 'doFillCredentialsIdItems' methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins.

CVE-2019-10438 jenkins vulnerability CVSS: 4.0 16 Oct 2019, 14:15 UTC

A missing permission check in Jenkins CRX Content Package Deployer Plugin 1.8.1 and earlier allowed attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2019-10437 jenkins vulnerability CVSS: 6.8 16 Oct 2019, 14:15 UTC

A cross-site request forgery vulnerability in Jenkins CRX Content Package Deployer Plugin 1.8.1 and earlier allowed attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2019-10436 jenkins vulnerability CVSS: 4.0 16 Oct 2019, 14:15 UTC

An arbitrary file read vulnerability in Jenkins Google OAuth Credentials Plugin 0.9 and earlier allowed attackers able to configure jobs and credentials in Jenkins to obtain the contents of any file on the Jenkins master.

CVE-2019-10435 jenkins vulnerability CVSS: 5.0 01 Oct 2019, 14:15 UTC

Jenkins SourceGear Vault Plugin transmits configured credentials in plain text as part of job configuration forms, potentially resulting in their exposure.

CVE-2019-10434 jenkins vulnerability CVSS: 5.0 01 Oct 2019, 14:15 UTC

Jenkins LDAP Email Plugin transmits configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.

CVE-2019-10433 jenkins vulnerability CVSS: 2.1 01 Oct 2019, 14:15 UTC

Jenkins Dingding[钉钉] Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-10432 jenkins vulnerability CVSS: 3.5 01 Oct 2019, 14:15 UTC

Jenkins HTML Publisher Plugin 1.20 and earlier did not escape the project and build display names in the HTML report frame, resulting in a cross-site scripting vulnerability exploitable by users able to change those.

CVE-2019-10431 jenkins vulnerability CVSS: 6.5 01 Oct 2019, 14:15 UTC

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.64 and earlier related to the handling of default parameter expressions in constructors allowed attackers to execute arbitrary code in sandboxed scripts.

CVE-2019-10430 jenkins vulnerability CVSS: 2.1 25 Sep 2019, 16:15 UTC

Jenkins NeuVector Vulnerability Scanner Plugin 1.5 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.

CVE-2019-10429 jenkins vulnerability CVSS: 2.1 25 Sep 2019, 16:15 UTC

Jenkins GitLab Logo Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-10428 jenkins vulnerability CVSS: 5.0 25 Sep 2019, 16:15 UTC

Jenkins Aqua Security Scanner Plugin 3.0.17 and earlier transmitted configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.

CVE-2019-10427 jenkins vulnerability CVSS: 5.0 25 Sep 2019, 16:15 UTC

Jenkins Aqua MicroScanner Plugin 1.0.7 and earlier transmitted configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.

CVE-2019-10426 jenkins vulnerability CVSS: 2.1 25 Sep 2019, 16:15 UTC

Jenkins Gem Publisher Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-10425 jenkins vulnerability CVSS: 4.0 25 Sep 2019, 16:15 UTC

Jenkins Google Calendar Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-10424 jenkins vulnerability CVSS: 2.1 25 Sep 2019, 16:15 UTC

Jenkins elOyente Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-10423 jenkins vulnerability CVSS: 2.1 25 Sep 2019, 16:15 UTC

Jenkins CodeScan Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-10422 jenkins vulnerability CVSS: 4.0 25 Sep 2019, 16:15 UTC

Jenkins Call Remote Job Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-10421 jenkins vulnerability CVSS: 4.0 25 Sep 2019, 16:15 UTC

Jenkins Azure Event Grid Build Notifier Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-10420 jenkins vulnerability CVSS: 2.1 25 Sep 2019, 16:15 UTC

Jenkins Assembla Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-10419 jenkins vulnerability CVSS: 2.1 25 Sep 2019, 16:15 UTC

Jenkins vFabric Application Director Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-10418 jenkins vulnerability CVSS: 6.5 25 Sep 2019, 16:15 UTC

Jenkins Kubernetes :: Pipeline :: Arquillian Steps Plugin provides a custom whitelist for script security that allowed attackers to invoke arbitrary methods, bypassing typical sandbox protection.

CVE-2019-10417 jenkins vulnerability CVSS: 6.5 25 Sep 2019, 16:15 UTC

Jenkins Kubernetes :: Pipeline :: Kubernetes Steps Plugin provides a custom whitelist for script security that allowed attackers to invoke arbitrary methods, bypassing typical sandbox protection.

CVE-2019-10416 jenkins vulnerability CVSS: 4.0 25 Sep 2019, 16:15 UTC

Jenkins Violation Comments to GitLab Plugin 2.28 and earlier stored credentials unencrypted in job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-10415 jenkins vulnerability CVSS: 4.0 25 Sep 2019, 16:15 UTC

Jenkins Violation Comments to GitLab Plugin 2.28 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.

CVE-2019-10414 jenkins vulnerability CVSS: 3.5 25 Sep 2019, 16:15 UTC

Jenkins Git Changelog Plugin 2.17 and earlier stored credentials unencrypted in job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-10413 jenkins vulnerability CVSS: 4.0 25 Sep 2019, 16:15 UTC

Jenkins Data Theorem: CI/CD Plugin 1.3 and earlier stored credentials unencrypted in job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-10412 jenkins vulnerability CVSS: 5.0 25 Sep 2019, 16:15 UTC

Jenkins Inedo ProGet Plugin 1.2 and earlier transmitted configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.

CVE-2019-10411 jenkins vulnerability CVSS: 5.0 25 Sep 2019, 16:15 UTC

Jenkins Inedo BuildMaster Plugin 2.4.0 and earlier transmitted configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.

CVE-2019-10410 jenkins vulnerability CVSS: 3.5 25 Sep 2019, 16:15 UTC

Jenkins Log Parser Plugin 2.0 and earlier did not escape an error message, resulting in a cross-site scripting vulnerability exploitable by users able to define log parsing rules.

CVE-2019-10409 jenkins vulnerability CVSS: 4.0 25 Sep 2019, 16:15 UTC

A missing permission check in Jenkins Project Inheritance Plugin 2.0.0 and earlier allowed attackers with Overall/Read permission to trigger project generation from templates.

CVE-2019-10408 jenkins vulnerability CVSS: 4.3 25 Sep 2019, 16:15 UTC

A cross-site request forgery vulnerability in Jenkins Project Inheritance Plugin 2.0.0 and earlier allowed attackers to trigger project generation from templates.

CVE-2019-10407 jenkins vulnerability CVSS: 4.0 25 Sep 2019, 16:15 UTC

Jenkins Project Inheritance Plugin 2.0.0 and earlier displayed a list of environment variables passed to a build without masking sensitive variables contributed by the Mask Passwords Plugin.

CVE-2019-10406 jenkins vulnerability CVSS: 3.5 25 Sep 2019, 16:15 UTC

Jenkins 2.196 and earlier, LTS 2.176.3 and earlier did not restrict or filter values set as Jenkins URL in the global configuration, resulting in a stored XSS vulnerability exploitable by attackers with Overall/Administer permission.

CVE-2019-10405 jenkins vulnerability CVSS: 3.5 25 Sep 2019, 16:15 UTC

Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value of the "Cookie" HTTP request header on the /whoAmI/ URL, allowing attackers exploiting another XSS vulnerability to obtain the HTTP session cookie despite it being marked HttpOnly.

CVE-2019-10404 jenkins vulnerability CVSS: 3.5 25 Sep 2019, 16:15 UTC

Jenkins 2.196 and earlier, LTS 2.176.3 and earlier did not escape the reason why a queue items is blcoked in tooltips, resulting in a stored XSS vulnerability exploitable by users able to control parts of the reason a queue item is blocked, such as label expressions not matching any idle executors.

CVE-2019-10403 jenkins vulnerability CVSS: 3.5 25 Sep 2019, 16:15 UTC

Jenkins 2.196 and earlier, LTS 2.176.3 and earlier did not escape the SCM tag name on the tooltip for SCM tag actions, resulting in a stored XSS vulnerability exploitable by users able to control SCM tag names for these actions.

CVE-2019-10402 jenkins vulnerability CVSS: 3.5 25 Sep 2019, 16:15 UTC

In Jenkins 2.196 and earlier, LTS 2.176.3 and earlier, the f:combobox form control interpreted its item labels as HTML, resulting in a stored XSS vulnerability exploitable by users with permission to define its contents.

CVE-2019-10401 jenkins vulnerability CVSS: 3.5 25 Sep 2019, 16:15 UTC

In Jenkins 2.196 and earlier, LTS 2.176.3 and earlier, the f:expandableTextBox form control interpreted its content as HTML when expanded, resulting in a stored XSS vulnerability exploitable by users with permission to define its contents (typically Job/Configure).

CVE-2019-10400 jenkins vulnerability CVSS: 4.9 12 Sep 2019, 14:15 UTC

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of subexpressions in increment and decrement expressions not involving actual assignment allowed attackers to execute arbitrary code in sandboxed scripts.

CVE-2019-10399 jenkins vulnerability CVSS: 4.9 12 Sep 2019, 14:15 UTC

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of property names in property expressions in increment and decrement expressions allowed attackers to execute arbitrary code in sandboxed scripts.

CVE-2019-10398 jenkins vulnerability CVSS: 2.1 12 Sep 2019, 14:15 UTC

Jenkins Beaker Builder Plugin 1.9 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.

CVE-2019-10397 jenkins vulnerability CVSS: 2.6 12 Sep 2019, 14:15 UTC

Jenkins Aqua Security Serverless Scanner Plugin 1.0.4 and earlier transmitted configured passwords in plain text as part of job configuration forms, potentially resulting in their exposure.

CVE-2019-10396 jenkins vulnerability CVSS: 3.5 12 Sep 2019, 14:15 UTC

Jenkins Dashboard View Plugin 2.11 and earlier did not escape build descriptions, resulting in a cross-site scripting vulnerability exploitable by users able to change build descriptions.

CVE-2019-10395 jenkins vulnerability CVSS: 3.5 12 Sep 2019, 14:15 UTC

Jenkins Build Environment Plugin 1.6 and earlier did not escape variables shown on its views, resulting in a cross-site scripting vulnerability in Jenkins 2.145, 2.138.1, or older, exploitable by users able to change various job/build properties.

CVE-2019-10394 jenkins vulnerability CVSS: 4.9 12 Sep 2019, 14:15 UTC

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of property names in property expressions on the left-hand side of assignment expressions allowed attackers to execute arbitrary code in sandboxed scripts.

CVE-2019-10393 jenkins vulnerability CVSS: 4.9 12 Sep 2019, 14:15 UTC

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of method names in method call expressions allowed attackers to execute arbitrary code in sandboxed scripts.

CVE-2019-10392 jenkins vulnerability CVSS: 6.5 12 Sep 2019, 14:15 UTC

Jenkins Git Client Plugin 2.8.4 and earlier and 3.0.0-rc did not properly restrict values passed as URL argument to an invocation of 'git ls-remote', resulting in OS command injection.

CVE-2019-10391 jenkins vulnerability CVSS: 4.3 28 Aug 2019, 16:15 UTC

Jenkins IBM Application Security on Cloud Plugin 1.2.4 and earlier transmitted configured passwords in plain text as part of job configuration forms, potentially resulting in their exposure.

CVE-2019-10390 jenkins vulnerability CVSS: 6.5 28 Aug 2019, 16:15 UTC

A sandbox bypass vulnerability in Jenkins Splunk Plugin 1.7.4 and earlier allowed attackers with Overall/Read permission to provide a Groovy script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.

CVE-2019-10384 jenkins vulnerability CVSS: 6.8 28 Aug 2019, 16:15 UTC

Jenkins 2.191 and earlier, LTS 2.176.2 and earlier allowed users to obtain CSRF tokens without an associated web session ID, resulting in CSRF tokens that did not expire and could be used to bypass CSRF protection for the anonymous user.

CVE-2019-10383 jenkins vulnerability CVSS: 3.5 28 Aug 2019, 16:15 UTC

A stored cross-site scripting vulnerability in Jenkins 2.191 and earlier, LTS 2.176.2 and earlier allowed attackers with Overall/Administer permission to configure the update site URL to inject arbitrary HTML and JavaScript in update center web pages.

CVE-2019-10389 jenkins vulnerability CVSS: 4.0 07 Aug 2019, 15:15 UTC

A missing permission check in Jenkins Relution Enterprise Appstore Publisher Plugin 1.24 and earlier allows attackers to have Jenkins initiate an HTTP connection to an attacker-specified server.

CVE-2019-10388 jenkins vulnerability CVSS: 4.3 07 Aug 2019, 15:15 UTC

A cross-site request forgery vulnerability in Jenkins Relution Enterprise Appstore Publisher Plugin 1.24 and earlier allows attackers to have Jenkins initiate an HTTP connection to an attacker-specified server.

CVE-2019-10387 jenkins vulnerability CVSS: 4.0 07 Aug 2019, 15:15 UTC

A missing permission check in Jenkins XL TestView Plugin 1.2.0 and earlier in XLTestView.XLTestDescriptor#doTestConnection allows users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2019-10386 jenkins vulnerability CVSS: 6.8 07 Aug 2019, 15:15 UTC

A cross-site request forgery vulnerability in Jenkins XL TestView Plugin 1.2.0 and earlier in XLTestView.XLTestDescriptor#doTestConnection allows users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2019-10385 jenkins vulnerability CVSS: 4.0 07 Aug 2019, 15:15 UTC

Jenkins eggPlant Plugin 2.2 and earlier stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-10382 jenkins vulnerability CVSS: 5.8 07 Aug 2019, 15:15 UTC

Jenkins VMware Lab Manager Slaves Plugin 0.2.8 and earlier disables SSL/TLS and hostname verification globally for the Jenkins master JVM.

CVE-2019-10381 jenkins vulnerability CVSS: 4.3 07 Aug 2019, 15:15 UTC

Jenkins Codefresh Integration Plugin 1.8 and earlier disables SSL/TLS and hostname verification globally for the Jenkins master JVM.

CVE-2019-10380 jenkins vulnerability CVSS: 6.5 07 Aug 2019, 15:15 UTC

Jenkins Simple Travis Pipeline Runner Plugin 1.0 and earlier specifies unsafe values in its custom Script Security whitelist, allowing attackers able to execute Script Security protected scripts to execute arbitrary code.

CVE-2019-10378 jenkins vulnerability CVSS: 2.1 07 Aug 2019, 15:15 UTC

Jenkins TestLink Plugin 3.16 and earlier stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-10377 jenkins vulnerability CVSS: 4.0 07 Aug 2019, 15:15 UTC

A missing permission check in Jenkins Avatar Plugin 1.2 and earlier allows attackers with Overall/Read access to change the avatar of any user of Jenkins.

CVE-2019-10376 jenkins vulnerability CVSS: 4.3 07 Aug 2019, 15:15 UTC

A reflected cross-site scripting vulnerability in Jenkins Wall Display Plugin 0.6.34 and earlier allows attackers to inject arbitrary HTML and JavaScript into web pages provided by this plugin.

CVE-2019-10375 jenkins vulnerability CVSS: 4.0 07 Aug 2019, 15:15 UTC

An arbitrary file read vulnerability in Jenkins File System SCM Plugin 2.1 and earlier allows attackers able to configure jobs in Jenkins to obtain the contents of any file on the Jenkins master.

CVE-2019-10374 jenkins vulnerability CVSS: 3.5 07 Aug 2019, 15:15 UTC

A stored cross-site scripting vulnerability in Jenkins PegDown Formatter Plugin 1.3 and earlier allows attackers able to edit descriptions and other fields rendered using the configured markup formatter to insert links with the javascript scheme into the Jenkins UI.

CVE-2019-10373 jenkins vulnerability CVSS: 3.5 07 Aug 2019, 15:15 UTC

A stored cross-site scripting vulnerability in Jenkins Build Pipeline Plugin 1.5.8 and earlier allows attackers able to edit the build pipeline description to inject arbitrary HTML and JavaScript in the plugin-provided web pages in Jenkins.

CVE-2019-10372 jenkins vulnerability CVSS: 5.8 07 Aug 2019, 15:15 UTC

An open redirect vulnerability in Jenkins Gitlab Authentication Plugin 1.4 and earlier in GitLabSecurityRealm.java allows attackers to redirect users to a URL outside Jenkins after successful login.

CVE-2019-10371 jenkins vulnerability CVSS: 5.0 07 Aug 2019, 15:15 UTC

A session fixation vulnerability in Jenkins Gitlab Authentication Plugin 1.4 and earlier in GitLabSecurityRealm.java allows unauthorized attackers to impersonate another user if they can control the pre-authentication session.

CVE-2019-10370 jenkins vulnerability CVSS: 4.3 07 Aug 2019, 15:15 UTC

Jenkins Mask Passwords Plugin 2.12.0 and earlier transmits globally configured passwords in plain text as part of the configuration form, potentially resulting in their exposure.

CVE-2019-10369 jenkins vulnerability CVSS: 4.0 07 Aug 2019, 15:15 UTC

A missing permission check in Jenkins JClouds Plugin 2.14 and earlier in BlobStoreProfile.DescriptorImpl#doTestConnection and JCloudsCloud.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2019-10368 jenkins vulnerability CVSS: 6.8 07 Aug 2019, 15:15 UTC

A cross-site request forgery vulnerability in Jenkins JClouds Plugin 2.14 and earlier in BlobStoreProfile.DescriptorImpl#doTestConnection and JCloudsCloud.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2019-10367 jenkins vulnerability CVSS: 2.1 07 Aug 2019, 15:15 UTC

Due to an incomplete fix of CVE-2019-10343, Jenkins Configuration as Code Plugin 1.26 and earlier did not properly apply masking to some values expected to be hidden when logging the configuration being applied.

CVE-2019-10366 jenkins vulnerability CVSS: 4.0 31 Jul 2019, 13:15 UTC

Jenkins Skytap Cloud CI Plugin 2.06 and earlier stored credentials unencrypted in job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-10364 jenkins vulnerability CVSS: 2.1 31 Jul 2019, 13:15 UTC

Jenkins Amazon EC2 Plugin 1.43 and earlier wrote the beginning of private keys to the Jenkins system log.

CVE-2019-10363 jenkins vulnerability CVSS: 4.0 31 Jul 2019, 13:15 UTC

Jenkins Configuration as Code Plugin 1.24 and earlier did not reliably identify sensitive values expected to be exported in their encrypted form.

CVE-2019-10362 jenkins vulnerability CVSS: 5.5 31 Jul 2019, 13:15 UTC

Jenkins Configuration as Code Plugin 1.24 and earlier did not escape values resulting in variable interpolation during configuration import when exporting, allowing attackers with permission to change Jenkins system configuration to obtain the values of environment variables.

CVE-2019-10361 jenkins vulnerability CVSS: 2.1 31 Jul 2019, 13:15 UTC

Jenkins Maven Release Plugin 0.14.0 and earlier stored credentials unencrypted on the Jenkins master where they could be viewed by users with access to the master file system.

CVE-2019-10360 jenkins vulnerability CVSS: 3.5 31 Jul 2019, 13:15 UTC

A stored cross site scripting vulnerability in Jenkins Maven Release Plugin 0.14.0 and earlier allowed attackers to inject arbitrary HTML and JavaScript in the plugin-provided web pages in Jenkins.

CVE-2019-10359 jenkins vulnerability CVSS: 6.8 31 Jul 2019, 13:15 UTC

A cross-site request forgery vulnerability in Jenkins Maven Release Plugin 0.14.0 and earlier in the M2ReleaseAction#doSubmit method allowed attackers to perform releases with attacker-specified options.

CVE-2019-10358 jenkins vulnerability CVSS: 4.0 31 Jul 2019, 13:15 UTC

Jenkins Maven Integration Plugin 3.3 and earlier did not apply build log decorators to module builds, potentially revealing sensitive build variables in the build log.

CVE-2019-10357 jenkins vulnerability CVSS: 4.0 31 Jul 2019, 13:15 UTC

A missing permission check in Jenkins Pipeline: Shared Groovy Libraries Plugin 2.14 and earlier allowed users with Overall/Read access to obtain limited information about the content of SCM repositories referenced by global libraries.

CVE-2019-10356 jenkins vulnerability CVSS: 6.5 31 Jul 2019, 13:15 UTC

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.61 and earlier related to the handling of method pointer expressions allowed attackers to execute arbitrary code in sandboxed scripts.

CVE-2019-10355 jenkins vulnerability CVSS: 6.5 31 Jul 2019, 13:15 UTC

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.61 and earlier related to the handling of type casts allowed attackers to execute arbitrary code in sandboxed scripts.

CVE-2019-10345 jenkins vulnerability CVSS: 2.1 31 Jul 2019, 13:15 UTC

Jenkins Configuration as Code Plugin 1.20 and earlier did not treat the proxy password as a secret to be masked when logging or encrypted for export.

CVE-2019-10344 jenkins vulnerability CVSS: 4.0 31 Jul 2019, 13:15 UTC

Missing permission checks in Jenkins Configuration as Code Plugin 1.24 and earlier in various HTTP endpoints allowed users with Overall/Read access to access the generated schema and documentation for this plugin containing detailed information about installed plugins.

CVE-2019-10343 jenkins vulnerability CVSS: 2.1 31 Jul 2019, 13:15 UTC

Jenkins Configuration as Code Plugin 1.24 and earlier did not properly apply masking to values expected to be hidden when logging the configuration being applied.

CVE-2019-1010241 jenkins vulnerability CVSS: 4.0 19 Jul 2019, 17:15 UTC

Jenkins Credentials Binding Plugin Jenkins 1.17 is affected by: CWE-257: Storing Passwords in a Recoverable Format. The impact is: Authenticated users can recover credentials. The component is: config-variables.jelly line #30 (passwordVariable). The attack vector is: Attacker creates and executes a Jenkins job.

CVE-2019-10354 jenkins vulnerability CVSS: 4.0 17 Jul 2019, 16:15 UTC

A vulnerability in the Stapler web framework used in Jenkins 2.185 and earlier, LTS 2.176.1 and earlier allowed attackers to access view fragments directly, bypassing permission checks and possibly obtain sensitive information.

CVE-2019-10353 jenkins vulnerability CVSS: 5.1 17 Jul 2019, 16:15 UTC

CSRF tokens in Jenkins 2.185 and earlier, LTS 2.176.1 and earlier did not expire, thereby allowing attackers able to obtain them to bypass CSRF protection.

CVE-2019-10352 jenkins vulnerability CVSS: 4.0 17 Jul 2019, 16:15 UTC

A path traversal vulnerability in Jenkins 2.185 and earlier, LTS 2.176.1 and earlier in core/src/main/java/hudson/model/FileParameterValue.java allowed attackers with Job/Configure permission to define a file parameter with a file name outside the intended directory, resulting in an arbitrary file write on the Jenkins master when scheduling a build.

CVE-2019-10351 jenkins vulnerability CVSS: 4.0 11 Jul 2019, 14:15 UTC

Jenkins Caliper CI Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-10350 jenkins vulnerability CVSS: 4.0 11 Jul 2019, 14:15 UTC

Jenkins Port Allocator Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-10349 jenkins vulnerability CVSS: 3.5 11 Jul 2019, 14:15 UTC

A stored cross site scripting vulnerability in Jenkins Dependency Graph Viewer Plugin 0.13 and earlier allowed attackers able to configure jobs in Jenkins to inject arbitrary HTML and JavaScript in the plugin-provided web pages in Jenkins.

CVE-2019-10348 jenkins vulnerability CVSS: 4.0 11 Jul 2019, 14:15 UTC

Jenkins Gogs Plugin stored credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-10347 jenkins vulnerability CVSS: 4.0 11 Jul 2019, 14:15 UTC

Jenkins Mashup Portlets Plugin stored credentials unencrypted on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-10346 jenkins vulnerability CVSS: 4.3 11 Jul 2019, 14:15 UTC

A reflected cross site scripting vulnerability in Jenkins Embeddable Build Status Plugin 2.0.1 and earlier allowed attackers inject arbitrary HTML and JavaScript into the response of this plugin.

CVE-2019-10342 jenkins vulnerability CVSS: 4.0 11 Jul 2019, 14:15 UTC

A missing permission check in Jenkins Docker Plugin 1.1.6 and earlier in various 'fillCredentialsIdItems' methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins.

CVE-2019-10341 jenkins vulnerability CVSS: 4.0 11 Jul 2019, 14:15 UTC

A missing permission check in Jenkins Docker Plugin 1.1.6 and earlier in DockerAPI.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2019-10340 jenkins vulnerability CVSS: 6.8 11 Jul 2019, 14:15 UTC

A cross-site request forgery vulnerability in Jenkins Docker Plugin 1.1.6 and earlier in DockerAPI.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2019-10339 jenkins vulnerability CVSS: 4.0 11 Jun 2019, 14:29 UTC

A missing permission check in Jenkins JX Resources Plugin 1.0.36 and earlier in GlobalPluginConfiguration#doValidateClient allowed users with Overall/Read access to have Jenkins connect to an attacker-specified Kubernetes server, potentially leaking credentials.

CVE-2019-10338 jenkins vulnerability CVSS: 6.8 11 Jun 2019, 14:29 UTC

A cross-site request forgery vulnerability in Jenkins JX Resources Plugin 1.0.36 and earlier in GlobalPluginConfiguration#doValidateClient allowed attackers to have Jenkins connect to an attacker-specified Kubernetes server, potentially leaking credentials.

CVE-2019-10337 jenkins vulnerability CVSS: 5.0 11 Jun 2019, 14:29 UTC

An XML external entities (XXE) vulnerability in Jenkins Token Macro Plugin 2.7 and earlier allowed attackers able to control a the content of the input file for the "XML" macro to have Jenkins resolve external entities, resulting in the extraction of secrets from the Jenkins agent, server-side request forgery, or denial-of-service attacks.

CVE-2019-10336 jenkins vulnerability CVSS: 4.3 11 Jun 2019, 14:29 UTC

A reflected cross site scripting vulnerability in Jenkins ElectricFlow Plugin 1.1.6 and earlier allowed attackers able to control the output of the ElectricFlow API to inject arbitrary HTML and JavaScript in job configuration forms containing post-build steps provided by this plugin.

CVE-2019-10335 jenkins vulnerability CVSS: 3.5 11 Jun 2019, 14:29 UTC

A stored cross site scripting vulnerability in Jenkins ElectricFlow Plugin 1.1.5 and earlier allowed attackers able to configure jobs in Jenkins or control the output of the ElectricFlow API to inject arbitrary HTML and JavaScript in the plugin-provided output on build status pages.

CVE-2019-10334 jenkins vulnerability CVSS: 5.8 11 Jun 2019, 14:29 UTC

Jenkins ElectricFlow Plugin 1.1.5 and earlier disabled SSL/TLS and hostname verification globally for the Jenkins master JVM when MultipartUtility.java is used to upload files.

CVE-2019-10333 jenkins vulnerability CVSS: 4.0 11 Jun 2019, 14:29 UTC

Missing permission checks in Jenkins ElectricFlow Plugin 1.1.5 and earlier in various HTTP endpoints allowed users with Overall/Read access to obtain information about the Jenkins ElectricFlow Plugin configuration and configuration of connected ElectricFlow instances.

CVE-2019-10332 jenkins vulnerability CVSS: 4.3 11 Jun 2019, 14:29 UTC

A missing permission check in Jenkins ElectricFlow Plugin 1.1.5 and earlier in Configuration#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials.

CVE-2019-10331 jenkins vulnerability CVSS: 4.3 11 Jun 2019, 14:29 UTC

A cross-site request forgery vulnerability in Jenkins ElectricFlow Plugin 1.1.5 and earlier in Configuration#doTestConnection allowed attackers to connect to an attacker-specified URL using attacker-specified credentials.

CVE-2019-10328 jenkins vulnerability CVSS: 6.5 31 May 2019, 15:29 UTC

Jenkins Pipeline Remote Loader Plugin 1.4 and earlier provided a custom whitelist for script security that allowed attackers to invoke arbitrary methods, bypassing typical sandbox protection.

CVE-2019-10327 jenkins vulnerability CVSS: 5.5 31 May 2019, 15:29 UTC

An XML external entities (XXE) vulnerability in Jenkins Pipeline Maven Integration Plugin 1.7.0 and earlier allowed attackers able to control a temporary directory's content on the agent running the Maven build to have Jenkins parse a maliciously crafted XML file that uses external entities for extraction of secrets from the Jenkins master, server-side request forgery, or denial-of-service attacks.

CVE-2019-10326 jenkins vulnerability CVSS: 4.3 31 May 2019, 15:29 UTC

A cross-site request forgery vulnerability in Jenkins Warnings NG Plugin 5.0.0 and earlier allowed attackers to reset warning counts for future builds.

CVE-2019-10325 jenkins vulnerability CVSS: 3.5 31 May 2019, 15:29 UTC

A cross-site scripting vulnerability in Jenkins Warnings NG Plugin 5.0.0 and earlier allowed attacker with Job/Configure permission to inject arbitrary JavaScript in build overview pages.

CVE-2019-10320 jenkins vulnerability CVSS: 4.0 21 May 2019, 13:29 UTC

Jenkins Credentials Plugin 2.1.18 and earlier allowed users with permission to create or update credentials to confirm the existence of files on the Jenkins master with an attacker-specified path, and obtain the certificate content of files containing a PKCS#12 certificate.

CVE-2019-10319 jenkins vulnerability CVSS: 4.0 21 May 2019, 13:29 UTC

A missing permission check in Jenkins PAM Authentication Plugin 1.5 and earlier, except 1.4.1 in PamSecurityRealm.DescriptorImpl#doTest allowed users with Overall/Read permission to obtain limited information about the file /etc/shadow and the user Jenkins is running as.

CVE-2019-10318 jenkins vulnerability CVSS: 4.0 30 Apr 2019, 13:29 UTC

Jenkins Azure AD Plugin 0.3.3 and earlier stored the client secret unencrypted in the global config.xml configuration file on the Jenkins master where it could be viewed by users with access to the master file system.

CVE-2019-10317 jenkins vulnerability CVSS: 4.3 30 Apr 2019, 13:29 UTC

Jenkins SiteMonitor Plugin 0.5 and earlier disabled SSL/TLS and hostname verification globally for the Jenkins master JVM.

CVE-2019-10316 jenkins vulnerability CVSS: 4.0 30 Apr 2019, 13:29 UTC

Jenkins Aqua MicroScanner Plugin 1.0.5 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.

CVE-2019-10315 jenkins vulnerability CVSS: 6.8 30 Apr 2019, 13:29 UTC

Jenkins GitHub Authentication Plugin 0.31 and earlier did not use the state parameter of OAuth to prevent CSRF.

CVE-2019-10314 jenkins vulnerability CVSS: 4.3 30 Apr 2019, 13:29 UTC

Jenkins Koji Plugin disables SSL/TLS and hostname verification globally for the Jenkins master JVM.

CVE-2019-10313 jenkins vulnerability CVSS: 4.0 30 Apr 2019, 13:29 UTC

Jenkins Twitter Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-10312 jenkins vulnerability CVSS: 4.0 30 Apr 2019, 13:29 UTC

A missing permission check in Jenkins Ansible Tower Plugin 0.9.1 and earlier in the TowerInstallation.TowerInstallationDescriptor#doFillTowerCredentialsIdItems method allowed attackers with Overall/Read permission to enumerate credentials ID of credentials stored in Jenkins.

CVE-2019-10311 jenkins vulnerability CVSS: 4.0 30 Apr 2019, 13:29 UTC

A missing permission check in Jenkins Ansible Tower Plugin 0.9.1 and earlier in the TowerInstallation.TowerInstallationDescriptor#doTestTowerConnection form validation method allowed attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2019-10310 jenkins vulnerability CVSS: 6.8 30 Apr 2019, 13:29 UTC

A cross-site request forgery vulnerability in Jenkins Ansible Tower Plugin 0.9.1 and earlier in the TowerInstallation.TowerInstallationDescriptor#doTestTowerConnection form validation method allowed attackers permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins

CVE-2019-10309 jenkins vulnerability CVSS: 4.8 30 Apr 2019, 13:29 UTC

Jenkins Self-Organizing Swarm Plug-in Modules Plugin clients that use UDP broadcasts to discover Jenkins masters do not prevent XML External Entity processing when processing the responses, allowing unauthorized attackers on the same network to read arbitrary files from Swarm clients.

CVE-2019-10308 jenkins vulnerability CVSS: 4.0 30 Apr 2019, 13:29 UTC

A missing permission check in Jenkins Static Analysis Utilities Plugin 1.95 and earlier in the DefaultGraphConfigurationView#doSave form handler method allowed attackers with Overall/Read permission to change the per-job default graph configuration for all users.

CVE-2019-10307 jenkins vulnerability CVSS: 4.3 30 Apr 2019, 13:29 UTC

A cross-site request forgery vulnerability in Jenkins Static Analysis Utilities Plugin 1.95 and earlier in the DefaultGraphConfigurationView#doSave form handler method allowed attackers to change the per-job default graph configuration for all users.

CVE-2019-10306 jenkins vulnerability CVSS: 6.5 18 Apr 2019, 17:29 UTC

A sandbox bypass vulnerability in Jenkins ontrack Plugin 3.4 and earlier allowed attackers with control over ontrack DSL definitions to execute arbitrary code on the Jenkins master JVM.

CVE-2019-10305 jenkins vulnerability CVSS: 4.0 18 Apr 2019, 17:29 UTC

A missing permission check in Jenkins XebiaLabs XL Deploy Plugin in the Credential#doValidateUserNamePassword form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.

CVE-2019-10304 jenkins vulnerability CVSS: 4.3 18 Apr 2019, 17:29 UTC

A cross-site request forgery vulnerability in Jenkins XebiaLabs XL Deploy Plugin in the Credential#doValidateUserNamePassword form validation method allows attackers to initiate a connection to an attacker-specified server.

CVE-2019-10303 jenkins vulnerability CVSS: 4.0 18 Apr 2019, 17:29 UTC

Jenkins Azure PublisherSettings Credentials Plugin 1.2 and earlier stored credentials unencrypted in the credentials.xml file on the Jenkins master where they could be viewed by users with access to the master file system.

CVE-2019-10302 jenkins vulnerability CVSS: 4.0 18 Apr 2019, 17:29 UTC

Jenkins jira-ext Plugin 0.8 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.

CVE-2019-10301 jenkins vulnerability CVSS: 4.0 18 Apr 2019, 17:29 UTC

A missing permission check in Jenkins GitLab Plugin 1.5.11 and earlier in the GitLabConnectionConfig#doTestConnection form validation method allowed attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2019-10300 jenkins vulnerability CVSS: 3.5 18 Apr 2019, 17:29 UTC

A cross-site request forgery vulnerability in Jenkins GitLab Plugin 1.5.11 and earlier in the GitLabConnectionConfig#doTestConnection form validation method allowed attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2019-1003050 jenkins vulnerability CVSS: 3.5 10 Apr 2019, 21:29 UTC

The f:validateButton form control for the Jenkins UI did not properly escape job URLs in Jenkins 2.171 and earlier and Jenkins LTS 2.164.1 and earlier, resulting in a cross-site scripting (XSS) vulnerability exploitable by users with the ability to control job names.

CVE-2019-1003049 jenkins vulnerability CVSS: 6.8 10 Apr 2019, 21:29 UTC

Users who cached their CLI authentication before Jenkins was updated to 2.150.2 and newer, or 2.160 and newer, would remain authenticated in Jenkins 2.171 and earlier and Jenkins LTS 2.164.1 and earlier, because the fix for CVE-2019-1003004 in these releases did not reject existing remoting-based CLI authentication caches.

CVE-2019-10299 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins CloudCoreo DeployTime Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-10298 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins Koji Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-10297 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins Sametime Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-10296 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins Serena SRA Deploy Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-10295 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins crittercism-dsym Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-10294 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins Kmap Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-10293 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

A missing permission check in Jenkins Kmap Plugin in KmapJenkinsBuilder.DescriptorImpl form validation methods allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.

CVE-2019-10292 jenkins vulnerability CVSS: 4.3 04 Apr 2019, 16:29 UTC

A cross-site request forgery vulnerability in Jenkins Kmap Plugin in KmapJenkinsBuilder.DescriptorImpl form validation methods allows attackers to initiate a connection to an attacker-specified server.

CVE-2019-10291 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins Netsparker Cloud Scan Plugin 1.1.5 and older stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.

CVE-2019-10290 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

A missing permission check in Jenkins Netsparker Cloud Scan Plugin 1.1.5 and older in the NCScanBuilder.DescriptorImpl#doValidateAPI form validation method allowed attackers with Overall/Read permission to initiate a connection to an attacker-specified server.

CVE-2019-10289 jenkins vulnerability CVSS: 4.3 04 Apr 2019, 16:29 UTC

A cross-site request forgery vulnerability in Jenkins Netsparker Cloud Scan Plugin 1.1.5 and older in the NCScanBuilder.DescriptorImpl#doValidateAPI form validation method allowed attackers to initiate a connection to an attacker-specified server.

CVE-2019-10288 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins Jabber Server Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-10287 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins youtrack-plugin Plugin 0.7.1 and older stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.

CVE-2019-10286 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins DeployHub Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-10285 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins Minio Storage Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-10284 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins Diawi Upload Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-10283 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins mabl Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-10282 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins Klaros-Testmanagement Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-10281 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins Relution Enterprise Appstore Publisher Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-10280 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins Assembla Auth Plugin stores credentials unencrypted in the global config.xml configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-10279 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

A missing permission check in Jenkins jenkins-reviewbot Plugin in the ReviewboardDescriptor#doTestConnection form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.

CVE-2019-10278 jenkins vulnerability CVSS: 4.3 04 Apr 2019, 16:29 UTC

A cross-site request forgery vulnerability in Jenkins jenkins-reviewbot Plugin in the ReviewboardDescriptor#doTestConnection form validation method allows attackers to initiate a connection to an attacker-specified server.

CVE-2019-10277 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins StarTeam Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-1003099 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

A missing permission check in Jenkins openid Plugin in the OpenIdSsoSecurityRealm.DescriptorImpl#doValidate form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.

CVE-2019-1003098 jenkins vulnerability CVSS: 4.3 04 Apr 2019, 16:29 UTC

A cross-site request forgery vulnerability in Jenkins openid Plugin in the OpenIdSsoSecurityRealm.DescriptorImpl#doValidate form validation method allows attackers to initiate a connection to an attacker-specified server.

CVE-2019-1003097 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins Crowd Integration Plugin stores credentials unencrypted in the global config.xml configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-1003096 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins TestFairy Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-1003095 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins Perfecto Mobile Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-1003094 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins Open STF Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-1003093 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

A missing permission check in Jenkins Nomad Plugin in the NomadCloud.DescriptorImpl#doTestConnection form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.

CVE-2019-1003092 jenkins vulnerability CVSS: 4.3 04 Apr 2019, 16:29 UTC

A cross-site request forgery vulnerability in Jenkins Nomad Plugin in the NomadCloud.DescriptorImpl#doTestConnection form validation method allows attackers to initiate a connection to an attacker-specified server.

CVE-2019-1003091 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

A missing permission check in Jenkins SOASTA CloudTest Plugin in the CloudTestServer.DescriptorImpl#doValidate form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.

CVE-2019-1003090 jenkins vulnerability CVSS: 4.3 04 Apr 2019, 16:29 UTC

A cross-site request forgery vulnerability in Jenkins SOASTA CloudTest Plugin in the CloudTestServer.DescriptorImpl#doValidate form validation method allows attackers to initiate a connection to an attacker-specified server.

CVE-2019-1003089 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins Upload to pgyer Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-1003088 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins Fabric Beta Publisher Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-1003087 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

A missing permission check in Jenkins Chef Sinatra Plugin in the ChefBuilderConfiguration.DescriptorImpl#doTestConnection form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.

CVE-2019-1003086 jenkins vulnerability CVSS: 4.3 04 Apr 2019, 16:29 UTC

A cross-site request forgery vulnerability in Jenkins Chef Sinatra Plugin in the ChefBuilderConfiguration.DescriptorImpl#doTestConnection form validation method allows attackers to initiate a connection to an attacker-specified server.

CVE-2019-1003085 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

A missing permission check in Jenkins Zephyr Enterprise Test Management Plugin in the ZeeDescriptor#doTestConnection form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.

CVE-2019-1003084 jenkins vulnerability CVSS: 4.3 04 Apr 2019, 16:29 UTC

A cross-site request forgery vulnerability in Jenkins Zephyr Enterprise Test Management Plugin in the ZeeDescriptor#doTestConnection form validation method allows attackers to initiate a connection to an attacker-specified server.

CVE-2019-1003083 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

A missing permission check in Jenkins Gearman Plugin in the GearmanPluginConfig#doTestConnection form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.

CVE-2019-1003082 jenkins vulnerability CVSS: 4.3 04 Apr 2019, 16:29 UTC

A cross-site request forgery vulnerability in Jenkins Gearman Plugin in the GearmanPluginConfig#doTestConnection form validation method allows attackers to initiate a connection to an attacker-specified server.

CVE-2019-1003081 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

A missing permission check in Jenkins OpenShift Deployer Plugin in the DeployApplication.DeployApplicationDescriptor#doCheckLogin form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.

CVE-2019-1003080 jenkins vulnerability CVSS: 4.3 04 Apr 2019, 16:29 UTC

A cross-site request forgery vulnerability in Jenkins OpenShift Deployer Plugin in the DeployApplication.DeployApplicationDescriptor#doCheckLogin form validation method allows attackers to initiate a connection to an attacker-specified server.

CVE-2019-1003079 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

A missing permission check in Jenkins VMware Lab Manager Slaves Plugin in the LabManager.DescriptorImpl#doTestConnection form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.

CVE-2019-1003078 jenkins vulnerability CVSS: 4.3 04 Apr 2019, 16:29 UTC

A cross-site request forgery vulnerability in Jenkins VMware Lab Manager Slaves Plugin in the LabManager.DescriptorImpl#doTestConnection form validation method allows attackers to initiate a connection to an attacker-specified server.

CVE-2019-1003077 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

A missing permission check in Jenkins Audit to Database Plugin in the DbAuditPublisherDescriptorImpl#doTestJdbcConnection form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.

CVE-2019-1003076 jenkins vulnerability CVSS: 4.3 04 Apr 2019, 16:29 UTC

A cross-site request forgery vulnerability in Jenkins Audit to Database Plugin in the DbAuditPublisherDescriptorImpl#doTestJdbcConnection form validation method allows attackers to initiate a connection to an attacker-specified server.

CVE-2019-1003075 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins Audit to Database Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-1003074 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins Hyper.sh Commons Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-1003073 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins VS Team Services Continuous Deployment Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-1003072 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins WildFly Deployer Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-1003071 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins OctopusDeploy Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-1003070 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins veracode-scanner Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-1003069 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins Aqua Security Scanner Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-1003068 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins VMware vRealize Automation Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-1003067 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins Trac Publisher Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-1003066 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins Bugzilla Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-1003065 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins CloudShare Docker-Machine Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-1003064 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins aws-device-farm Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-1003063 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins Amazon SNS Build Notifier Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-1003062 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins AWS CloudWatch Logs Publisher Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-1003061 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins jenkins-cloudformation-plugin Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-1003060 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins Official OWASP ZAP Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-1003059 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

A missing permission check in Jenkins FTP publisher Plugin in the FTPPublisher.DescriptorImpl#doLoginCheck method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.

CVE-2019-1003058 jenkins vulnerability CVSS: 4.3 04 Apr 2019, 16:29 UTC

A cross-site request forgery vulnerability in Jenkins FTP publisher Plugin in the FTPPublisher.DescriptorImpl#doLoginCheck method allows attackers to initiate a connection to an attacker-specified server.

CVE-2019-1003057 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins Bitbucket Approve Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-1003056 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins WebSphere Deployer Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-1003055 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins FTP publisher Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-1003054 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins Jira Issue Updater Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-1003053 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins HockeyApp Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

CVE-2019-1003052 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins AWS Elastic Beanstalk Publisher Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-1003051 jenkins vulnerability CVSS: 4.0 04 Apr 2019, 16:29 UTC

Jenkins IRC Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

CVE-2019-1003048 jenkins vulnerability CVSS: 2.1 28 Mar 2019, 18:29 UTC

A vulnerability in Jenkins PRQA Plugin 3.1.0 and earlier allows attackers with local file system access to the Jenkins home directory to obtain the unencrypted password from the plugin configuration.

CVE-2019-1003047 jenkins vulnerability CVSS: 4.0 28 Mar 2019, 18:29 UTC

A missing permission check in Jenkins Fortify on Demand Uploader Plugin 3.0.10 and earlier allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.

CVE-2019-1003046 jenkins vulnerability CVSS: 4.3 28 Mar 2019, 18:29 UTC

A cross-site request forgery vulnerability in Jenkins Fortify on Demand Uploader Plugin 3.0.10 and earlier allows attackers to initiate a connection to an attacker-specified server.

CVE-2019-1003044 jenkins vulnerability CVSS: 2.1 28 Mar 2019, 18:29 UTC

A cross-site request forgery vulnerability in Jenkins Slack Notification Plugin 2.19 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2019-1003043 jenkins vulnerability CVSS: 3.5 28 Mar 2019, 18:29 UTC

A missing permission check in Jenkins Slack Notification Plugin 2.19 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2019-1003042 jenkins vulnerability CVSS: 3.5 28 Mar 2019, 18:29 UTC

A cross site scripting vulnerability in Jenkins Lockable Resources Plugin 2.4 and earlier allows attackers able to control resource names to inject arbitrary JavaScript in web pages rendered by the plugin.

CVE-2019-1003041 jenkins vulnerability CVSS: 7.5 28 Mar 2019, 18:29 UTC

A sandbox bypass vulnerability in Jenkins Pipeline: Groovy Plugin 2.64 and earlier allows attackers to invoke arbitrary constructors in sandboxed scripts.

CVE-2019-1003040 jenkins vulnerability CVSS: 7.5 28 Mar 2019, 18:29 UTC

A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.55 and earlier allows attackers to invoke arbitrary constructors in sandboxed scripts.

CVE-2019-1003039 jenkins vulnerability CVSS: 4.0 08 Mar 2019, 21:29 UTC

An insufficiently protected credentials vulnerability exists in JenkinsAppDynamics Dashboard Plugin 1.0.14 and earlier in src/main/java/nl/codecentric/jenkins/appd/AppDynamicsResultsPublisher.java that allows attackers without permission to obtain passwords configured in jobs to obtain them.

CVE-2019-1003038 jenkins vulnerability CVSS: 2.1 08 Mar 2019, 21:29 UTC

An insufficiently protected credentials vulnerability exists in Jenkins Repository Connector Plugin 1.2.4 and earlier in src/main/java/org/jvnet/hudson/plugins/repositoryconnector/ArtifactDeployer.java, src/main/java/org/jvnet/hudson/plugins/repositoryconnector/Repository.java, src/main/java/org/jvnet/hudson/plugins/repositoryconnector/UserPwd.java that allows an attacker with local file system access or control of a Jenkins administrator's web browser (e.g. malicious extension) to retrieve the password stored in the plugin configuration.

CVE-2019-1003037 jenkins vulnerability CVSS: 4.0 08 Mar 2019, 21:29 UTC

An information exposure vulnerability exists in Jenkins Azure VM Agents Plugin 0.8.0 and earlier in src/main/java/com/microsoft/azure/vmagent/AzureVMCloud.java that allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVE-2019-1003036 jenkins vulnerability CVSS: 4.0 08 Mar 2019, 21:29 UTC

A data modification vulnerability exists in Jenkins Azure VM Agents Plugin 0.8.0 and earlier in src/main/java/com/microsoft/azure/vmagent/AzureVMAgent.java that allows attackers with Overall/Read permission to attach a public IP address to an Azure VM agent.

CVE-2019-1003035 jenkins vulnerability CVSS: 4.0 08 Mar 2019, 21:29 UTC

An information exposure vulnerability exists in Jenkins Azure VM Agents Plugin 0.8.0 and earlier in src/main/java/com/microsoft/azure/vmagent/AzureVMAgentTemplate.java, src/main/java/com/microsoft/azure/vmagent/AzureVMCloud.java that allows attackers with Overall/Read permission to perform the 'verify configuration' form validation action, thereby obtaining limited information about the Azure configuration.

CVE-2019-1003034 jenkins vulnerability CVSS: 6.5 08 Mar 2019, 21:29 UTC

A sandbox bypass vulnerability exists in Jenkins Job DSL Plugin 1.71 and earlier in job-dsl-core/src/main/groovy/javaposse/jobdsl/dsl/AbstractDslScriptLoader.groovy, job-dsl-plugin/build.gradle, job-dsl-plugin/src/main/groovy/javaposse/jobdsl/plugin/JobDslWhitelist.groovy, job-dsl-plugin/src/main/groovy/javaposse/jobdsl/plugin/SandboxDslScriptLoader.groovy that allows attackers with control over Job DSL definitions to execute arbitrary code on the Jenkins master JVM.

CVE-2019-1003033 jenkins vulnerability CVSS: 6.5 08 Mar 2019, 21:29 UTC

A sandbox bypass vulnerability exists in Jenkins Groovy Plugin 2.1 and earlier in pom.xml, src/main/java/hudson/plugins/groovy/StringScriptSource.java that allows attackers with Overall/Read permission to execute arbitrary code on the Jenkins master JVM.

CVE-2019-1003032 jenkins vulnerability CVSS: 6.5 08 Mar 2019, 21:29 UTC

A sandbox bypass vulnerability exists in Jenkins Email Extension Plugin 2.64 and earlier in pom.xml, src/main/java/hudson/plugins/emailext/ExtendedEmailPublisher.java, src/main/java/hudson/plugins/emailext/plugins/content/EmailExtScript.java, src/main/java/hudson/plugins/emailext/plugins/content/ScriptContent.java, src/main/java/hudson/plugins/emailext/plugins/trigger/AbstractScriptTrigger.java that allows attackers with Job/Configure permission to execute arbitrary code on the Jenkins master JVM.

CVE-2019-1003031 jenkins vulnerability CVSS: 6.5 08 Mar 2019, 21:29 UTC

A sandbox bypass vulnerability exists in Jenkins Matrix Project Plugin 1.13 and earlier in pom.xml, src/main/java/hudson/matrix/FilterScript.java that allows attackers with Job/Configure permission to execute arbitrary code on the Jenkins master JVM.

CVE-2019-1003030 jenkins vulnerability CVSS: 6.5 08 Mar 2019, 21:29 UTC

A sandbox bypass vulnerability exists in Jenkins Pipeline: Groovy Plugin 2.63 and earlier in pom.xml, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShell.java that allows attackers able to control pipeline scripts to execute arbitrary code on the Jenkins master JVM.

CVE-2019-1003029 jenkins vulnerability CVSS: 6.5 08 Mar 2019, 21:29 UTC

A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.53 and earlier in src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/GroovySandbox.java, src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/SecureGroovyScript.java that allows attackers with Overall/Read permission to execute arbitrary code on the Jenkins master JVM.

CVE-2019-1003028 jenkins vulnerability CVSS: 4.0 20 Feb 2019, 21:29 UTC

A server-side request forgery vulnerability exists in Jenkins JMS Messaging Plugin 1.1.1 and earlier in SSLCertificateAuthenticationMethod.java, UsernameAuthenticationMethod.java that allows attackers with Overall/Read permission to have Jenkins connect to a JMS endpoint.

CVE-2019-1003027 jenkins vulnerability CVSS: 4.0 20 Feb 2019, 21:29 UTC

A server-side request forgery vulnerability exists in Jenkins OctopusDeploy Plugin 1.8.1 and earlier in OctopusDeployPlugin.java that allows attackers with Overall/Read permission to have Jenkins connect to an attacker-specified URL and obtain the HTTP response code if successful, and exception error message otherwise.

CVE-2019-1003026 jenkins vulnerability CVSS: 4.0 20 Feb 2019, 21:29 UTC

A server-side request forgery vulnerability exists in Jenkins Mattermost Notification Plugin 2.6.2 and earlier in MattermostNotifier.java that allows attackers with Overall/Read permission to have Jenkins connect to an attacker-specified Mattermost server and room and send a message.

CVE-2019-1003025 jenkins vulnerability CVSS: 4.0 20 Feb 2019, 21:29 UTC

A exposure of sensitive information vulnerability exists in Jenkins Cloud Foundry Plugin 2.3.1 and earlier in AbstractCloudFoundryPushDescriptor.java that allows attackers with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2019-1003024 jenkins vulnerability CVSS: 6.5 20 Feb 2019, 21:29 UTC

A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.52 and earlier in RejectASTTransformsCustomizer.java that allows attackers with Overall/Read permission to provide a Groovy script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.

CVE-2019-1003023 jenkins vulnerability CVSS: 4.3 06 Feb 2019, 16:29 UTC

A cross-site scripting vulnerability exists in Jenkins Warnings Next Generation Plugin 1.0.1 and earlier in src/main/java/io/jenkins/plugins/analysis/core/model/DetailsTableModel.java, src/main/java/io/jenkins/plugins/analysis/core/model/SourceDetail.java, src/main/java/io/jenkins/plugins/analysis/core/model/SourcePrinter.java, src/main/java/io/jenkins/plugins/analysis/core/util/Sanitizer.java, src/main/java/io/jenkins/plugins/analysis/warnings/DuplicateCodeScanner.java that allows attackers with the ability to control warnings parser input to have Jenkins render arbitrary HTML.

CVE-2019-1003022 jenkins vulnerability CVSS: 4.3 06 Feb 2019, 16:29 UTC

A denial of service vulnerability exists in Jenkins Monitoring Plugin 1.74.0 and earlier in PluginImpl.java that allows attackers to kill threads running on the Jenkins master.

CVE-2019-1003021 jenkins vulnerability CVSS: 4.3 06 Feb 2019, 16:29 UTC

An exposure of sensitive information vulnerability exists in Jenkins OpenId Connect Authentication Plugin 1.4 and earlier in OicSecurityRealm/config.jelly that allows attackers able to view a Jenkins administrator's web browser output, or control the browser (e.g. malicious extension) to retrieve the configured client secret.

CVE-2019-1003020 jenkins vulnerability CVSS: 4.0 06 Feb 2019, 16:29 UTC

A server-side request forgery vulnerability exists in Jenkins Kanboard Plugin 1.5.10 and earlier in KanboardGlobalConfiguration.java that allows attackers with Overall/Read permission to submit a GET request to an attacker-specified URL.

CVE-2019-1003019 jenkins vulnerability CVSS: 4.3 06 Feb 2019, 16:29 UTC

An session fixation vulnerability exists in Jenkins GitHub Authentication Plugin 0.29 and earlier in GithubSecurityRealm.java that allows unauthorized attackers to impersonate another user if they can control the pre-authentication session.

CVE-2019-1003018 jenkins vulnerability CVSS: 4.3 06 Feb 2019, 16:29 UTC

An exposure of sensitive information vulnerability exists in Jenkins GitHub Authentication Plugin 0.29 and earlier in GithubSecurityRealm/config.jelly that allows attackers able to view a Jenkins administrator's web browser output, or control the browser (e.g. malicious extension) to retrieve the configured client secret.

CVE-2019-1003017 jenkins vulnerability CVSS: 2.6 06 Feb 2019, 16:29 UTC

A data modification vulnerability exists in Jenkins Job Import Plugin 3.0 and earlier in JobImportAction.java that allows attackers to copy jobs from a preconfigured other Jenkins instance, potentially installing additional plugins necessary to load the imported job's configuration.

CVE-2019-1003016 jenkins vulnerability CVSS: 4.3 06 Feb 2019, 16:29 UTC

An exposure of sensitive information vulnerability exists in Jenkins Job Import Plugin 2.1 and earlier in src/main/java/org/jenkins/ci/plugins/jobimport/JobImportAction.java, src/main/java/org/jenkins/ci/plugins/jobimport/JobImportGlobalConfig.java, src/main/java/org/jenkins/ci/plugins/jobimport/model/JenkinsSite.java that allows attackers with Overall/Read permission to have Jenkins connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2019-1003015 jenkins vulnerability CVSS: 6.4 06 Feb 2019, 16:29 UTC

An XML external entity processing vulnerability exists in Jenkins Job Import Plugin 2.1 and earlier in src/main/java/org/jenkins/ci/plugins/jobimport/client/RestApiClient.java that allows attackers with the ability to control the HTTP server (Jenkins) queried in preparation of job import to read arbitrary files, perform a denial of service attack, etc.

CVE-2019-1003014 jenkins vulnerability CVSS: 3.5 06 Feb 2019, 16:29 UTC

An cross-site scripting vulnerability exists in Jenkins Config File Provider Plugin 3.4.1 and earlier in src/main/resources/lib/configfiles/configfiles.jelly that allows attackers with permission to define shared configuration files to execute arbitrary JavaScript when a user attempts to delete the shared configuration file.

CVE-2019-1003013 jenkins vulnerability CVSS: 3.5 06 Feb 2019, 16:29 UTC

An cross-site scripting vulnerability exists in Jenkins Blue Ocean Plugins 1.10.1 and earlier in blueocean-commons/src/main/java/io/jenkins/blueocean/commons/stapler/Export.java, blueocean-commons/src/main/java/io/jenkins/blueocean/commons/stapler/export/ExportConfig.java, blueocean-commons/src/main/java/io/jenkins/blueocean/commons/stapler/export/JSONDataWriter.java, blueocean-rest-impl/src/main/java/io/jenkins/blueocean/service/embedded/UserStatePreloader.java, blueocean-web/src/main/resources/io/jenkins/blueocean/PageStatePreloadDecorator/header.jelly that allows attackers with permission to edit a user's description in Jenkins to have Blue Ocean render arbitrary HTML when using it as that user.

CVE-2019-1003012 jenkins vulnerability CVSS: 4.3 06 Feb 2019, 16:29 UTC

A data modification vulnerability exists in Jenkins Blue Ocean Plugins 1.10.1 and earlier in blueocean-core-js/src/js/bundleStartup.js, blueocean-core-js/src/js/fetch.ts, blueocean-core-js/src/js/i18n/i18n.js, blueocean-core-js/src/js/urlconfig.js, blueocean-rest/src/main/java/io/jenkins/blueocean/rest/APICrumbExclusion.java, blueocean-web/src/main/java/io/jenkins/blueocean/BlueOceanUI.java, blueocean-web/src/main/resources/io/jenkins/blueocean/BlueOceanUI/index.jelly that allows attackers to bypass all cross-site request forgery protection in Blue Ocean API.

CVE-2019-1003011 jenkins vulnerability CVSS: 5.5 06 Feb 2019, 16:29 UTC

An information exposure and denial of service vulnerability exists in Jenkins Token Macro Plugin 2.5 and earlier in src/main/java/org/jenkinsci/plugins/tokenmacro/Parser.java, src/main/java/org/jenkinsci/plugins/tokenmacro/TokenMacro.java, src/main/java/org/jenkinsci/plugins/tokenmacro/impl/AbstractChangesSinceMacro.java, src/main/java/org/jenkinsci/plugins/tokenmacro/impl/ChangesSinceLastBuildMacro.java, src/main/java/org/jenkinsci/plugins/tokenmacro/impl/ProjectUrlMacro.java that allows attackers with the ability to control token macro input (such as SCM changelogs) to define recursive input that results in unexpected macro evaluation.

CVE-2019-1003010 jenkins vulnerability CVSS: 4.3 06 Feb 2019, 16:29 UTC

A cross-site request forgery vulnerability exists in Jenkins Git Plugin 3.9.1 and earlier in src/main/java/hudson/plugins/git/GitTagAction.java that allows attackers to create a Git tag in a workspace and attach corresponding metadata to a build record.

CVE-2019-1003009 jenkins vulnerability CVSS: 5.8 06 Feb 2019, 16:29 UTC

An improper certificate validation vulnerability exists in Jenkins Active Directory Plugin 2.10 and earlier in src/main/java/hudson/plugins/active_directory/ActiveDirectoryDomain.java, src/main/java/hudson/plugins/active_directory/ActiveDirectorySecurityRealm.java, src/main/java/hudson/plugins/active_directory/ActiveDirectoryUnixAuthenticationProvider.java that allows attackers to impersonate the Active Directory server Jenkins connects to for authentication if Jenkins is configured to use StartTLS.

CVE-2019-1003008 jenkins vulnerability CVSS: 6.8 06 Feb 2019, 16:29 UTC

A cross-site request forgery vulnerability exists in Jenkins Warnings Next Generation Plugin 2.1.1 and earlier in src/main/java/io/jenkins/plugins/analysis/warnings/groovy/GroovyParser.java that allows attackers to execute arbitrary code via a form validation HTTP endpoint.

CVE-2019-1003007 jenkins vulnerability CVSS: 6.8 06 Feb 2019, 16:29 UTC

A cross-site request forgery vulnerability exists in Jenkins Warnings Plugin 5.0.0 and earlier in src/main/java/hudson/plugins/warnings/GroovyParser.java that allows attackers to execute arbitrary code via a form validation HTTP endpoint.

CVE-2019-1003006 jenkins vulnerability CVSS: 6.5 06 Feb 2019, 16:29 UTC

A sandbox bypass vulnerability exists in Jenkins Groovy Plugin 2.0 and earlier in src/main/java/hudson/plugins/groovy/StringScriptSource.java that allows attackers with Overall/Read permission to provide a Groovy script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.

CVE-2019-1003005 jenkins vulnerability CVSS: 6.5 06 Feb 2019, 16:29 UTC

A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.50 and earlier in src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/SecureGroovyScript.java that allows attackers with Overall/Read permission to provide a Groovy script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.

CVE-2018-1000997 jenkins vulnerability CVSS: 4.0 23 Jan 2019, 22:29 UTC

A path traversal vulnerability exists in the Stapler web framework used by Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/org/kohsuke/stapler/Facet.java, groovy/src/main/java/org/kohsuke/stapler/jelly/groovy/GroovyFacet.java, jelly/src/main/java/org/kohsuke/stapler/jelly/JellyFacet.java, jruby/src/main/java/org/kohsuke/stapler/jelly/jruby/JRubyFacet.java, jsp/src/main/java/org/kohsuke/stapler/jsp/JSPFacet.java that allows attackers to render routable objects using any view in Jenkins, exposing internal information about those objects not intended to be viewed, such as their toString() representation.

CVE-2019-1003004 jenkins vulnerability CVSS: 6.5 22 Jan 2019, 14:29 UTC

An improper authorization vulnerability exists in Jenkins 2.158 and earlier, LTS 2.150.1 and earlier in core/src/main/java/hudson/security/AuthenticationProcessingFilter2.java that allows attackers to extend the duration of active HTTP sessions indefinitely even though the user account may have been deleted in the mean time.

CVE-2019-1003003 jenkins vulnerability CVSS: 6.5 22 Jan 2019, 14:29 UTC

An improper authorization vulnerability exists in Jenkins 2.158 and earlier, LTS 2.150.1 and earlier in core/src/main/java/hudson/security/TokenBasedRememberMeServices2.java that allows attackers with Overall/RunScripts permission to craft Remember Me cookies that would never expire, allowing e.g. to persist access to temporarily compromised user accounts.

CVE-2019-1003002 jenkins vulnerability CVSS: 6.5 22 Jan 2019, 14:29 UTC

A sandbox bypass vulnerability exists in Pipeline: Declarative Plugin 1.3.3 and earlier in pipeline-model-definition/src/main/groovy/org/jenkinsci/plugins/pipeline/modeldefinition/parser/Converter.groovy that allows attackers with Overall/Read permission to provide a pipeline script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.

CVE-2019-1003001 jenkins vulnerability CVSS: 6.5 22 Jan 2019, 14:29 UTC

A sandbox bypass vulnerability exists in Pipeline: Groovy Plugin 2.61 and earlier in src/main/java/org/jenkinsci/plugins/workflow/cps/CpsFlowDefinition.java, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShellFactory.java that allows attackers with Overall/Read permission to provide a pipeline script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.

CVE-2019-1003000 jenkins vulnerability CVSS: 6.5 22 Jan 2019, 14:29 UTC

A sandbox bypass vulnerability exists in Script Security Plugin 1.49 and earlier in src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/GroovySandbox.java that allows attackers with the ability to provide sandboxed scripts to execute arbitrary code on the Jenkins master JVM.

CVE-2018-1000426 jenkins vulnerability CVSS: 4.3 09 Jan 2019, 23:29 UTC

A cross-site scripting vulnerability exists in Jenkins Git Changelog Plugin 2.6 and earlier in GitChangelogSummaryDecorator/summary.jelly, GitChangelogLeftsideBuildDecorator/badge.jelly, GitLogJiraFilterPostPublisher/config.jelly, GitLogBasicChangelogPostPublisher/config.jelly that allows attackers able to control the Git history parsed by the plugin to have Jenkins render arbitrary HTML on some pages.

CVE-2018-1000417 jenkins vulnerability CVSS: 5.8 09 Jan 2019, 23:29 UTC

A cross-site request forgery vulnerability exists in Jenkins Email Extension Template Plugin 1.0 and earlier in ExtEmailTemplateManagement.java that allows creating or removing templates.

CVE-2018-1000414 jenkins vulnerability CVSS: 5.8 09 Jan 2019, 23:29 UTC

A cross-site request forgery vulnerability exists in Jenkins Config File Provider Plugin 3.1 and earlier in ConfigFilesManagement.java, FolderConfigFileAction.java that allows creating and editing configuration file definitions.

CVE-2018-1000413 jenkins vulnerability CVSS: 3.5 09 Jan 2019, 23:29 UTC

A cross-site scripting vulnerability exists in Jenkins Config File Provider Plugin 3.1 and earlier in configfiles.jelly, providerlist.jelly that allows users with the ability to configure configuration files to insert arbitrary HTML into some pages in Jenkins.

CVE-2018-1000412 jenkins vulnerability CVSS: 4.0 09 Jan 2019, 23:29 UTC

An improper authorization vulnerability exists in Jenkins Jira Plugin 3.0.1 and earlier in JiraSite.java that allows attackers with Overall/Read access to have Jenkins connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2018-1000411 jenkins vulnerability CVSS: 4.3 09 Jan 2019, 23:29 UTC

A cross-site request forgery vulnerability exists in Jenkins JUnit Plugin 1.25 and earlier in TestObject.java that allows setting the description of a test result.

CVE-2018-1000410 jenkins vulnerability CVSS: 2.1 09 Jan 2019, 23:29 UTC

An information exposure vulnerability exists in Jenkins 2.145 and earlier, LTS 2.138.1 and earlier, and the Stapler framework used by these releases, in core/src/main/java/org/kohsuke/stapler/RequestImpl.java, core/src/main/java/hudson/model/Descriptor.java that allows attackers with Overall/Administer permission or access to the local file system to obtain credentials entered by users if the form submission could not be successfully processed.

CVE-2018-1000409 jenkins vulnerability CVSS: 5.8 09 Jan 2019, 23:29 UTC

A session fixation vulnerability exists in Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/hudson/security/HudsonPrivateSecurityRealm.java that prevented Jenkins from invalidating the existing session and creating a new one when a user signed up for a new user account.

CVE-2018-1000408 jenkins vulnerability CVSS: 6.4 09 Jan 2019, 23:29 UTC

A denial of service vulnerability exists in Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/hudson/security/HudsonPrivateSecurityRealm.java that allows attackers without Overall/Read permission to access a specific URL on instances using the built-in Jenkins user database security realm that results in the creation of an ephemeral user record in memory.

CVE-2018-1000407 jenkins vulnerability CVSS: 4.3 09 Jan 2019, 23:29 UTC

A cross-site scripting vulnerability exists in Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/hudson/model/Api.java that allows attackers to specify URLs to Jenkins that result in rendering arbitrary attacker-controlled HTML by Jenkins.

CVE-2018-1000406 jenkins vulnerability CVSS: 4.0 09 Jan 2019, 23:29 UTC

A path traversal vulnerability exists in Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/hudson/model/FileParameterValue.java that allows attackers with Job/Configure permission to define a file parameter with a file name outside the intended directory, resulting in an arbitrary file write on the Jenkins master when scheduling a build.

CVE-2018-1000866 jenkins vulnerability CVSS: 6.5 10 Dec 2018, 14:29 UTC

A sandbox bypass vulnerability exists in Pipeline: Groovy Plugin 2.59 and earlier in groovy-sandbox/src/main/java/org/kohsuke/groovy/sandbox/SandboxTransformer.java, groovy-cps/lib/src/main/java/com/cloudbees/groovy/cps/SandboxCpsTransformer.java that allows attackers with Job/Configure permission, or unauthorized attackers with SCM commit privileges and corresponding pipelines based on Jenkinsfiles set up in Jenkins, to execute arbitrary code on the Jenkins master JVM

CVE-2018-1000865 jenkins vulnerability CVSS: 6.5 10 Dec 2018, 14:29 UTC

A sandbox bypass vulnerability exists in Script Security Plugin 1.47 and earlier in groovy-sandbox/src/main/java/org/kohsuke/groovy/sandbox/SandboxTransformer.java that allows attackers with Job/Configure permission to execute arbitrary code on the Jenkins master JVM, if plugins using the Groovy sandbox are installed.

CVE-2018-1000864 jenkins vulnerability CVSS: 4.0 10 Dec 2018, 14:29 UTC

A denial of service vulnerability exists in Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in CronTab.java that allows attackers with Overall/Read permission to have a request handling thread enter an infinite loop.

CVE-2018-1000863 jenkins vulnerability CVSS: 6.4 10 Dec 2018, 14:29 UTC

A data modification vulnerability exists in Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in User.java, IdStrategy.java that allows attackers to submit crafted user names that can cause an improper migration of user record storage formats, potentially preventing the victim from logging into Jenkins.

CVE-2018-1000862 jenkins vulnerability CVSS: 4.0 10 Dec 2018, 14:29 UTC

An information exposure vulnerability exists in Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in DirectoryBrowserSupport.java that allows attackers with the ability to control build output to browse the file system on agents running builds beyond the duration of the build using the workspace browser.

CVE-2018-1000861 jenkins vulnerability CVSS: 10.0 10 Dec 2018, 14:29 UTC

A code execution vulnerability exists in the Stapler web framework used by Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in stapler/core/src/main/java/org/kohsuke/stapler/MetaClass.java that allows attackers to invoke some methods on Java objects by accessing crafted URLs that were not intended to be invoked this way.

CVE-2018-1999047 jenkins vulnerability CVSS: 4.0 23 Aug 2018, 18:29 UTC

A improper authorization vulnerability exists in Jenkins 2.137 and earlier, 2.121.2 and earlier in UpdateCenter.java that allows attackers to cancel a Jenkins restart scheduled through the update center.

CVE-2018-1999046 jenkins vulnerability CVSS: 4.0 23 Aug 2018, 18:29 UTC

A exposure of sensitive information vulnerability exists in Jenkins 2.137 and earlier, 2.121.2 and earlier in Computer.java that allows attackers With Overall/Read permission to access the connection log for any agent.

CVE-2018-1999045 jenkins vulnerability CVSS: 5.5 23 Aug 2018, 18:29 UTC

A improper authentication vulnerability exists in Jenkins 2.137 and earlier, 2.121.2 and earlier in SecurityRealm.java, TokenBasedRememberMeServices2.java that allows attackers with a valid cookie to remain logged in even if that feature is disabled.

CVE-2018-1999044 jenkins vulnerability CVSS: 4.0 23 Aug 2018, 18:29 UTC

A denial of service vulnerability exists in Jenkins 2.137 and earlier, 2.121.2 and earlier in CronTab.java that allows attackers with Overall/Read permission to have a request handling thread enter an infinite loop.

CVE-2018-1999043 jenkins vulnerability CVSS: 5.0 23 Aug 2018, 18:29 UTC

A denial of service vulnerability exists in Jenkins 2.137 and earlier, 2.121.2 and earlier in BasicAuthenticationFilter.java, BasicHeaderApiTokenAuthenticator.java that allows attackers to create ephemeral in-memory user records by attempting to log in using invalid credentials.

CVE-2018-1999042 jenkins vulnerability CVSS: 5.0 23 Aug 2018, 18:29 UTC

A vulnerability exists in Jenkins 2.137 and earlier, 2.121.2 and earlier in XStream2.java that allows attackers to have Jenkins resolve a domain name when deserializing an instance of java.net.URL.

CVE-2017-2654 jenkins vulnerability CVSS: 5.0 06 Aug 2018, 22:29 UTC

jenkins-email-ext before version 2.57.1 is vulnerable to an Information Exposure. The Email Extension Plugins is able to send emails to a dynamically created list of users based on the changelogs, like authors of SCM changes since the last successful build. This could in some cases result in emails being sent to people who have no user account in Jenkins, and in rare cases even people who were not involved in whatever project was being built, due to some mapping based on the local-part of email addresses.

CVE-2018-1999041 jenkins vulnerability CVSS: 2.1 01 Aug 2018, 13:29 UTC

An exposure of sensitive information vulnerability exists in Jenkins Tinfoil Security Plugin 1.6.1 and earlier in TinfoilScanRecorder.java that allows attackers with file system access to the Jenkins master to obtain the API secret key stored in this plugin's configuration.

CVE-2018-1999040 jenkins vulnerability CVSS: 4.0 01 Aug 2018, 13:29 UTC

An exposure of sensitive information vulnerability exists in Jenkins Kubernetes Plugin 1.10.1 and earlier in KubernetesCloud.java that allows attackers to capture credentials with a known credentials ID stored in Jenkins.

CVE-2018-1999039 jenkins vulnerability CVSS: 4.0 01 Aug 2018, 13:29 UTC

A server-side request forgery vulnerability exists in Jenkins Confluence Publisher Plugin 2.0.1 and earlier in ConfluenceSite.java that allows attackers to have Jenkins submit login requests to an attacker-specified Confluence server URL with attacker specified credentials.

CVE-2018-1999038 jenkins vulnerability CVSS: 4.9 01 Aug 2018, 13:29 UTC

A confused deputy vulnerability exists in Jenkins Publisher Over CIFS Plugin 0.10 and earlier in CifsPublisherPluginDescriptor.java that allows attackers to have Jenkins connect to an attacker specified CIFS server with attacker specified credentials.

CVE-2018-1999037 jenkins vulnerability CVSS: 4.0 01 Aug 2018, 13:29 UTC

A data modification vulnerability exists in Jenkins Resource Disposer Plugin 0.11 and earlier in AsyncResourceDisposer.java that allows attackers to stop tracking a resource.

CVE-2018-1999036 jenkins vulnerability CVSS: 4.0 01 Aug 2018, 13:29 UTC

An exposure of sensitive information vulnerability exists in Jenkins SSH Agent Plugin 1.15 and earlier in SSHAgentStepExecution.java that exposes the SSH private key password to users with permission to read the build log.

CVE-2018-1999035 jenkins vulnerability CVSS: 5.8 01 Aug 2018, 13:29 UTC

A man in the middle vulnerability exists in Jenkins Inedo BuildMaster Plugin 1.3 and earlier in BuildMasterConfiguration.java, BuildMasterConfig.java, BuildMasterApi.java that allows attackers to impersonate any service that Jenkins connects to.

CVE-2018-1999034 jenkins vulnerability CVSS: 5.8 01 Aug 2018, 13:29 UTC

A man in the middle vulnerability exists in Jenkins Inedo ProGet Plugin 0.8 and earlier in ProGetApi.java, ProGetConfig.java, ProGetConfiguration.java that allows attackers to impersonate any service that Jenkins connects to.

CVE-2018-1999031 jenkins vulnerability CVSS: 4.0 01 Aug 2018, 13:29 UTC

An exposure of sensitive information vulnerability exists in Jenkins meliora-testlab Plugin 1.14 and earlier in TestlabNotifier.java that allows attackers with file system access to the Jenkins master to obtain the API key stored in this plugin's configuration.

CVE-2018-1999030 jenkins vulnerability CVSS: 4.0 01 Aug 2018, 13:29 UTC

An exposure of sensitive information vulnerability exists in Jenkins Maven Artifact ChoiceListProvider (Nexus) Plugin 1.3.1 and earlier in ArtifactoryChoiceListProvider.java, NexusChoiceListProvider.java, Nexus3ChoiceListProvider.java that allows attackers to capture credentials with a known credentials ID stored in Jenkins.

CVE-2018-1999029 jenkins vulnerability CVSS: 3.5 01 Aug 2018, 13:29 UTC

A cross-site scripting vulnerability exists in Jenkins Shelve Project Plugin 1.5 and earlier in ShelveProjectAction/index.jelly, ShelvedProjectsAction/index.jelly that allows attackers with Job/Configure permission to define JavaScript that would be executed in another user's browser when that other user performs some UI actions.

CVE-2018-1999028 jenkins vulnerability CVSS: 4.0 01 Aug 2018, 13:29 UTC

An exposure of sensitive information vulnerability exists in Jenkins Accurev Plugin 0.7.16 and earlier in AccurevSCM.java that allows attackers to capture credentials with a known credentials ID stored in Jenkins.

CVE-2018-1999027 jenkins vulnerability CVSS: 6.8 01 Aug 2018, 13:29 UTC

An exposure of sensitive information vulnerability exists in Jenkins SaltStack Plugin 3.1.6 and earlier in SaltAPIBuilder.java, SaltAPIStep.java that allows attackers to capture credentials with a known credentials ID stored in Jenkins.

CVE-2018-1999026 jenkins vulnerability CVSS: 4.0 01 Aug 2018, 13:29 UTC

A server-side request forgery vulnerability exists in Jenkins TraceTronic ECU-TEST Plugin 2.3 and earlier in ATXPublisher.java that allows attackers to have Jenkins send HTTP requests to an attacker-specified host.

CVE-2018-1999025 jenkins vulnerability CVSS: 5.8 01 Aug 2018, 13:29 UTC

A man in the middle vulnerability exists in Jenkins TraceTronic ECU-TEST Plugin 2.3 and earlier in ATXPublisher.java, ATXValidator.java that allows attackers to impersonate any service that Jenkins connects to.

CVE-2017-2652 jenkins vulnerability CVSS: 9.0 27 Jul 2018, 20:29 UTC

It was found that there were no permission checks performed in the Distributed Fork plugin before and including 1.5.0 for Jenkins that provides the dist-fork CLI command beyond the basic check for Overall/Read permission, allowing anyone with that permission to run arbitrary shell commands on all connected nodes.

CVE-2017-2650 jenkins vulnerability CVSS: 6.0 27 Jul 2018, 20:29 UTC

It was found that the use of Pipeline: Classpath Step Jenkins plugin enables a bypass of the Script Security sandbox for users with SCM commit access, as well as users with e.g. Job/Configure permission in Jenkins.

CVE-2017-2649 jenkins vulnerability CVSS: 6.8 27 Jul 2018, 20:29 UTC

It was found that the Active Directory Plugin for Jenkins up to and including version 2.2 did not verify certificates of the Active Directory server, thereby enabling Man-in-the-Middle attacks.

CVE-2017-2648 jenkins vulnerability CVSS: 6.8 27 Jul 2018, 20:29 UTC

It was found that jenkins-ssh-slaves-plugin before version 1.15 did not perform host key verification, thereby enabling Man-in-the-Middle attacks.

CVE-2017-2651 jenkins vulnerability CVSS: 4.3 27 Jul 2018, 18:29 UTC

jenkins-mailer-plugin before version 1.20 is vulnerable to an information disclosure while using the feature to send emails to a dynamically created list of users based on the changelogs. This could in some cases result in emails being sent to people who have no user account in Jenkins, and in rare cases even people who were not involved in whatever project was being built, due to some mapping based on the local-part of email addresses.

CVE-2018-1999007 jenkins vulnerability CVSS: 3.5 23 Jul 2018, 19:29 UTC

A cross-site scripting vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in the Stapler web framework's org/kohsuke/stapler/Stapler.java that allows attackers with the ability to control the existence of some URLs in Jenkins to define JavaScript that would be executed in another user's browser when that other user views HTTP 404 error pages while Stapler debug mode is enabled.

CVE-2018-1999006 jenkins vulnerability CVSS: 4.0 23 Jul 2018, 19:29 UTC

A exposure of sensitive information vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in Plugin.java that allows attackers to determine the date and time when a plugin HPI/JPI file was last extracted, which typically is the date of the most recent installation/upgrade.

CVE-2018-1999005 jenkins vulnerability CVSS: 3.5 23 Jul 2018, 19:29 UTC

A cross-site scripting vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in BuildTimelineWidget.java, BuildTimelineWidget/control.jelly that allows attackers with Job/Configure permission to define JavaScript that would be executed in another user's browser when that other user performs some UI actions.

CVE-2018-1999004 jenkins vulnerability CVSS: 4.0 23 Jul 2018, 19:29 UTC

A Improper authorization vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in SlaveComputer.java that allows attackers with Overall/Read permission to initiate agent launches, and abort in-progress agent launches.

CVE-2018-1999003 jenkins vulnerability CVSS: 4.0 23 Jul 2018, 19:29 UTC

A Improper authorization vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in Queue.java that allows attackers with Overall/Read permission to cancel queued builds.

CVE-2018-1999002 jenkins vulnerability CVSS: 5.0 23 Jul 2018, 19:29 UTC

A arbitrary file read vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in the Stapler web framework's org/kohsuke/stapler/Stapler.java that allows attackers to send crafted HTTP requests returning the contents of any file on the Jenkins master file system that the Jenkins master has access to.

CVE-2018-1999001 jenkins vulnerability CVSS: 4.3 23 Jul 2018, 19:29 UTC

A unauthorized modification of configuration vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in User.java that allows attackers to provide crafted login credentials that cause Jenkins to move the config.xml file from the Jenkins home directory. If Jenkins is started without this file present, it will revert to the legacy defaults of granting administrator access to anonymous users.

CVE-2018-1000404 jenkins vulnerability CVSS: 2.1 09 Jul 2018, 13:29 UTC

Jenkins project Jenkins AWS CodeBuild Plugin version 0.26 and earlier contains a Insufficiently Protected Credentials vulnerability in AWSClientFactory.java, CodeBuilder.java that can result in Credentials Disclosure. This attack appear to be exploitable via local file access. This vulnerability appears to have been fixed in 0.27 and later.

CVE-2018-1000403 jenkins vulnerability CVSS: 2.1 09 Jul 2018, 13:29 UTC

Jenkins project Jenkins AWS CodeDeploy Plugin version 1.19 and earlier contains a Insufficiently Protected Credentials vulnerability in AWSCodeDeployPublisher.java that can result in Credentials Disclosure. This attack appear to be exploitable via local file access. This vulnerability appears to have been fixed in 1.20 and later.

CVE-2018-1000402 jenkins vulnerability CVSS: 5.0 09 Jul 2018, 13:29 UTC

Jenkins project Jenkins AWS CodeDeploy Plugin version 1.19 and earlier contains a File and Directory Information Exposure vulnerability in AWSCodeDeployPublisher.java that can result in Disclosure of environment variables. This vulnerability appears to have been fixed in 1.20 and later.

CVE-2018-1000401 jenkins vulnerability CVSS: 2.1 09 Jul 2018, 13:29 UTC

Jenkins project Jenkins AWS CodePipeline Plugin version 0.36 and earlier contains a Insufficiently Protected Credentials vulnerability in AWSCodePipelineSCM.java that can result in Credentials Disclosure. This attack appear to be exploitable via local file access. This vulnerability appears to have been fixed in 0.37 and later.

CVE-2018-1000610 jenkins vulnerability CVSS: 4.0 26 Jun 2018, 17:29 UTC

A exposure of sensitive information vulnerability exists in Jenkins Configuration as Code Plugin 0.7-alpha and earlier in DataBoundConfigurator.java, Attribute.java, BaseConfigurator.java, ExtensionConfigurator.java that allows attackers with access to Jenkins log files to obtain the passwords configured using Configuration as Code Plugin.

CVE-2018-1000609 jenkins vulnerability CVSS: 4.0 26 Jun 2018, 17:29 UTC

A exposure of sensitive information vulnerability exists in Jenkins Configuration as Code Plugin 0.7-alpha and earlier in ConfigurationAsCode.java that allows attackers with Overall/Read access to obtain the YAML export of the Jenkins configuration.

CVE-2018-1000608 jenkins vulnerability CVSS: 4.0 26 Jun 2018, 17:29 UTC

A exposure of sensitive information vulnerability exists in Jenkins z/OS Connector Plugin 1.2.6.1 and earlier in SCLMSCM.java that allows an attacker with local file system access or control of a Jenkins administrator's web browser (e.g. malicious extension) to retrieve the configured password.

CVE-2018-1000607 jenkins vulnerability CVSS: 4.0 26 Jun 2018, 17:29 UTC

A arbitrary file write vulnerability exists in Jenkins Fortify CloudScan Plugin 1.5.1 and earlier in ArchiveUtil.java that allows attackers able to control rulepack zip file contents to overwrite any file on the Jenkins master file system, only limited by the permissions of the user the Jenkins master process is running as.

CVE-2018-1000606 jenkins vulnerability CVSS: 4.0 26 Jun 2018, 17:29 UTC

A server-side request forgery vulnerability exists in Jenkins URLTrigger Plugin 0.41 and earlier in URLTrigger.java that allows attackers with Overall/Read access to cause Jenkins to send a GET request to a specified URL.

CVE-2018-1000605 jenkins vulnerability CVSS: 5.8 26 Jun 2018, 17:29 UTC

A man in the middle vulnerability exists in Jenkins CollabNet Plugin 2.0.4 and earlier in CollabNetApp.java, CollabNetPlugin.java, CNFormFieldValidator.java that allows attackers to impersonate any service that Jenkins connects to.

CVE-2018-1000604 jenkins vulnerability CVSS: 3.5 26 Jun 2018, 17:29 UTC

A persisted cross-site scripting vulnerability exists in Jenkins Badge Plugin 1.4 and earlier in BadgeSummaryAction.java, HtmlBadgeAction.java that allows attackers able to control build badge content to define JavaScript that would be executed in another user's browser when that other user performs some UI actions.

CVE-2018-1000603 jenkins vulnerability CVSS: 4.0 26 Jun 2018, 17:29 UTC

A exposure of sensitive information vulnerability exists in Jenkins Openstack Cloud Plugin 2.35 and earlier in BootSource.java, InstancesToRun.java, JCloudsCleanupThread.java, JCloudsCloud.java, JCloudsComputer.java, JCloudsPreCreationThread.java, JCloudsRetentionStrategy.java, JCloudsSlave.java, JCloudsSlaveTemplate.java, LauncherFactory.java, OpenstackCredentials.java, OpenStackMachineStep.java, SlaveOptions.java, SlaveOptionsDescriptor.java that allows attackers with Overall/Read access to Jenkins to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins, and to cause Jenkins to submit HTTP requests to attacker-specified URLs.

CVE-2018-1000602 jenkins vulnerability CVSS: 4.3 26 Jun 2018, 17:29 UTC

A session fixation vulnerability exists in Jenkins SAML Plugin 1.0.6 and earlier in SamlSecurityRealm.java that allows unauthorized attackers to impersonate another users if they can control the pre-authentication session.

CVE-2018-1000601 jenkins vulnerability CVSS: 4.0 26 Jun 2018, 17:29 UTC

A arbitrary file read vulnerability exists in Jenkins SSH Credentials Plugin 1.13 and earlier in BasicSSHUserPrivateKey.java that allows attackers with a Jenkins account and the permission to configure credential bindings to read arbitrary files from the Jenkins master file system.

CVE-2018-1000600 jenkins vulnerability CVSS: 4.3 26 Jun 2018, 17:29 UTC

A exposure of sensitive information vulnerability exists in Jenkins GitHub Plugin 1.29.1 and earlier in GitHubTokenCredentialsCreator.java that allows attackers to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2018-1000202 jenkins vulnerability CVSS: 3.5 05 Jun 2018, 21:29 UTC

A persisted cross-site scripting vulnerability exists in Jenkins Groovy Postbuild Plugin 2.3.1 and older in various Jelly files that allows attackers able to control build badge content to define JavaScript that would be executed in another user's browser when that other user performs some UI actions.

CVE-2018-1000198 jenkins vulnerability CVSS: 4.0 05 Jun 2018, 21:29 UTC

A XML external entity processing vulnerability exists in Jenkins Black Duck Hub Plugin 3.1.0 and older in PostBuildScanDescriptor.java that allows attackers with Overall/Read permission to make Jenkins process XML eternal entities in an XML document.

CVE-2018-1000197 jenkins vulnerability CVSS: 5.5 05 Jun 2018, 21:29 UTC

An improper authorization vulnerability exists in Jenkins Black Duck Hub Plugin 3.0.3 and older in PostBuildScanDescriptor.java that allows users with Overall/Read permission to read and write the Black Duck Hub plugin configuration.

CVE-2018-1000196 jenkins vulnerability CVSS: 4.0 05 Jun 2018, 21:29 UTC

A exposure of sensitive information vulnerability exists in Jenkins Gitlab Hook Plugin 1.4.2 and older in gitlab_notifier.rb, views/gitlab_notifier/global.erb that allows attackers with local Jenkins master file system access or control of a Jenkins administrator's web browser (e.g. malicious extension) to retrieve the configured Gitlab token.

CVE-2018-1000195 jenkins vulnerability CVSS: 4.3 05 Jun 2018, 21:29 UTC

A server-side request forgery vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in ZipExtractionInstaller.java that allows users with Overall/Read permission to have Jenkins submit a HTTP GET request to an arbitrary URL and learn whether the response is successful (200) or not.

CVE-2018-1000194 jenkins vulnerability CVSS: 5.5 05 Jun 2018, 21:29 UTC

A path traversal vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in FilePath.java, SoloFilePathFilter.java that allows malicious agents to read and write arbitrary files on the Jenkins master, bypassing the agent-to-master security subsystem protection.

CVE-2018-1000193 jenkins vulnerability CVSS: 4.0 05 Jun 2018, 21:29 UTC

A improper neutralization of control sequences vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in HudsonPrivateSecurityRealm.java that allows users to sign up using user names containing control characters that can then appear to have the same name as other users, and cannot be deleted via the UI.

CVE-2018-1000192 jenkins vulnerability CVSS: 4.0 05 Jun 2018, 21:29 UTC

A information exposure vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in AboutJenkins.java, ListPluginsCommand.java that allows users with Overall/Read access to enumerate all installed plugins.

CVE-2018-1000191 jenkins vulnerability CVSS: 4.0 05 Jun 2018, 20:29 UTC

A exposure of sensitive information vulnerability exists in Jenkins Black Duck Detect Plugin 1.4.0 and older in DetectPostBuildStepDescriptor.java that allows attackers with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2018-1000190 jenkins vulnerability CVSS: 4.0 05 Jun 2018, 20:29 UTC

A exposure of sensitive information vulnerability exists in Jenkins Black Duck Hub Plugin 4.0.0 and older in PostBuildScanDescriptor.java that allows attackers with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2018-1000189 jenkins vulnerability CVSS: 6.5 05 Jun 2018, 20:29 UTC

A command execution vulnerability exists in Jenkins Absint Astree Plugin 1.0.5 and older in AstreeBuilder.java that allows attackers with Overall/Read access to execute a command on the Jenkins master.

CVE-2018-1000188 jenkins vulnerability CVSS: 5.5 05 Jun 2018, 20:29 UTC

A server-side request forgery vulnerability exists in Jenkins CAS Plugin 1.4.1 and older in CasSecurityRealm.java that allows attackers with Overall/Read access to cause Jenkins to send a GET request to a specified URL.

CVE-2018-1000187 jenkins vulnerability CVSS: 4.0 05 Jun 2018, 20:29 UTC

A exposure of sensitive information vulnerability exists in Jenkins Kubernetes Plugin 1.7.0 and older in ContainerExecDecorator.java that results in sensitive variables such as passwords being written to logs.

CVE-2018-1000186 jenkins vulnerability CVSS: 4.0 05 Jun 2018, 20:29 UTC

A exposure of sensitive information vulnerability exists in Jenkins GitHub Pull Request Builder Plugin 1.41.0 and older in GhprbGitHubAuth.java that allows attackers with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2018-1000185 jenkins vulnerability CVSS: 4.0 05 Jun 2018, 20:29 UTC

A server-side request forgery vulnerability exists in Jenkins GitHub Branch Source Plugin 2.3.4 and older in Endpoint.java that allows attackers with Overall/Read access to cause Jenkins to send a GET request to a specified URL.

CVE-2018-1000184 jenkins vulnerability CVSS: 5.5 05 Jun 2018, 20:29 UTC

A server-side request forgery vulnerability exists in Jenkins GitHub Plugin 1.29.0 and older in GitHubPluginConfig.java that allows attackers with Overall/Read access to cause Jenkins to send a GET request to a specified URL.

CVE-2018-1000183 jenkins vulnerability CVSS: 4.0 05 Jun 2018, 20:29 UTC

A exposure of sensitive information vulnerability exists in Jenkins GitHub Plugin 1.29.0 and older in GitHubServerConfig.java that allows attackers with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVE-2018-1000182 jenkins vulnerability CVSS: 5.5 05 Jun 2018, 20:29 UTC

A server-side request forgery vulnerability exists in Jenkins Git Plugin 3.9.0 and older in AssemblaWeb.java, GitBlitRepositoryBrowser.java, Gitiles.java, TFS2013GitRepositoryBrowser.java, ViewGitWeb.java that allows attackers with Overall/Read access to cause Jenkins to send a GET request to a specified URL.

CVE-2017-2598 jenkins vulnerability CVSS: 4.0 23 May 2018, 13:29 UTC

Jenkins before versions 2.44, 2.32.2 uses AES ECB block cipher mode without IV for encrypting secrets which makes Jenkins and the stored secrets vulnerable to unnecessary risks (SECURITY-304).

CVE-2017-2609 jenkins vulnerability CVSS: 4.0 22 May 2018, 17:29 UTC

jenkins before versions 2.44, 2.32.2 is vulnerable to an information disclosure vulnerability in search suggestions (SECURITY-385). The autocomplete feature on the search box discloses the names of the views in its suggestions, including the ones for which the current user does not have access to.

CVE-2017-2607 jenkins vulnerability CVSS: 3.5 21 May 2018, 23:29 UTC

jenkins before versions 2.44, 2.32.2 is vulnerable to a persisted cross-site scripting vulnerability in console notes (SECURITY-382). Jenkins allows plugins to annotate build logs, adding new content or changing the presentation of existing content while the build is running. Malicious Jenkins users, or users with SCM access, could configure jobs or modify build scripts such that they print serialized console notes that perform cross-site scripting attacks on Jenkins users viewing the build logs.

CVE-2017-2613 jenkins vulnerability CVSS: 5.8 15 May 2018, 22:29 UTC

jenkins before versions 2.44, 2.32.2 is vulnerable to a user creation CSRF using GET by admins. While this user record was only retained until restart in most cases, administrators' web browsers could be manipulated to create a large number of user records (SECURITY-406).

CVE-2017-2610 jenkins vulnerability CVSS: 3.5 15 May 2018, 21:29 UTC

jenkins before versions 2.44, 2.32.2 is vulnerable to a persisted cross-site scripting in search suggestions due to improperly escaping users with less-than and greater-than characters in their names (SECURITY-388).

CVE-2017-2604 jenkins vulnerability CVSS: 4.0 15 May 2018, 21:29 UTC

In Jenkins before versions 2.44, 2.32.2 low privilege users were able to act on administrative monitors due to them not being consistently protected by permission checks (SECURITY-371).

CVE-2017-2603 jenkins vulnerability CVSS: 3.5 15 May 2018, 21:29 UTC

Jenkins before versions 2.44, 2.32.2 is vulnerable to a user data leak in disconnected agents' config.xml API. This could leak sensitive data such as API tokens (SECURITY-362).

CVE-2017-2602 jenkins vulnerability CVSS: 4.0 15 May 2018, 21:29 UTC

jenkins before versions 2.44, 2.32.2 is vulnerable to an improper blacklisting of the Pipeline metadata files in the agent-to-master security subsystem. This could allow metadata files to be written to by malicious agents (SECURITY-358).

CVE-2017-2612 jenkins vulnerability CVSS: 5.5 15 May 2018, 20:29 UTC

In Jenkins before versions 2.44, 2.32.2 low privilege users were able to override JDK download credentials (SECURITY-392), resulting in future builds possibly failing to download a JDK.

CVE-2017-2608 jenkins vulnerability CVSS: 6.5 15 May 2018, 20:29 UTC

Jenkins before versions 2.44, 2.32.2 is vulnerable to a remote code execution vulnerability involving the deserialization of various types in javax.imageio in XStream-based APIs (SECURITY-383).

CVE-2017-2600 jenkins vulnerability CVSS: 4.0 15 May 2018, 20:29 UTC

In jenkins before versions 2.44, 2.32.2 node monitor data could be viewed by low privilege users via the remote API. These included system configuration and runtime information of these nodes (SECURITY-343).

CVE-2017-2601 jenkins vulnerability CVSS: 3.5 10 May 2018, 13:29 UTC

Jenkins before versions 2.44, 2.32.2 is vulnerable to a persisted cross-site scripting in parameter names and descriptions (SECURITY-353). Users with the permission to configure jobs were able to inject JavaScript into parameter names and descriptions.

CVE-2017-2606 jenkins vulnerability CVSS: 4.0 08 May 2018, 20:29 UTC

Jenkins before versions 2.44, 2.32.2 is vulnerable to an information exposure in the internal API that allows access to item names that should not be visible (SECURITY-380). This only affects anonymous users (other users legitimately have access) that were able to get a list of items via an UnprotectedRootAction.

CVE-2017-2611 jenkins vulnerability CVSS: 4.0 08 May 2018, 18:29 UTC

Jenkins before versions 2.44, 2.32.2 is vulnerable to an insufficient permission check for periodic processes (SECURITY-389). The URLs /workspaceCleanup and /fingerprintCleanup did not perform permission checks, allowing users with read access to Jenkins to trigger these background processes (that are otherwise performed daily), possibly causing additional load on Jenkins master and agents.

CVE-2018-1000177 jenkins vulnerability CVSS: 3.5 08 May 2018, 15:29 UTC

A cross-site scripting vulnerability exists in Jenkins S3 Plugin 0.10.12 and older in src/main/resources/hudson/plugins/s3/S3ArtifactsProjectAction/jobMain.jelly that allows attackers able to control file names of uploaded files to define file names containing JavaScript that would be executed in another user's browser when that user performs some UI actions.

CVE-2018-1000176 jenkins vulnerability CVSS: 4.0 08 May 2018, 15:29 UTC

An exposure of sensitive information vulnerability exists in Jenkins Email Extension Plugin 2.61 and older in src/main/resources/hudson/plugins/emailext/ExtendedEmailPublisher/global.groovy and ExtendedEmailPublisherDescriptor.java that allows attackers with control of a Jenkins administrator's web browser (e.g. malicious extension) to retrieve the configured SMTP password.

CVE-2018-1000175 jenkins vulnerability CVSS: 4.0 08 May 2018, 15:29 UTC

A path traversal vulnerability exists in Jenkins HTML Publisher Plugin 1.15 and older in HtmlPublisherTarget.java that allows attackers able to configure the HTML Publisher build step to override arbitrary files on the Jenkins master.

CVE-2018-1000174 jenkins vulnerability CVSS: 5.8 08 May 2018, 15:29 UTC

An open redirect vulnerability exists in Jenkins Google Login Plugin 1.3 and older in GoogleOAuth2SecurityRealm.java that allows attackers to redirect users to an arbitrary URL after successful login.

CVE-2018-1000173 jenkins vulnerability CVSS: 4.3 08 May 2018, 15:29 UTC

A session fixaction vulnerability exists in Jenkins Google Login Plugin 1.3 and older in GoogleOAuth2SecurityRealm.java that allows unauthorized attackers to impersonate another user if they can control the pre-authentication session.

CVE-2018-1000170 jenkins vulnerability CVSS: 3.5 16 Apr 2018, 09:58 UTC

A cross-site scripting vulnerability exists in Jenkins 2.115 and older, LTS 2.107.1 and older, in confirmationList.jelly and stopButton.jelly that allows attackers with Job/Configure and/or Job/Create permission to create an item name containing JavaScript that would be executed in another user's browser when that other user performs some UI actions.

CVE-2018-1000169 jenkins vulnerability CVSS: 5.0 16 Apr 2018, 09:58 UTC

An exposure of sensitive information vulnerability exists in Jenkins 2.115 and older, LTS 2.107.1 and older, in CLICommand.java and ViewOptionHandler.java that allows unauthorized attackers to confirm the existence of agents or views with an attacker-specified name by sending a CLI command to Jenkins.

CVE-2017-2599 jenkins vulnerability CVSS: 5.5 11 Apr 2018, 16:29 UTC

Jenkins before versions 2.44 and 2.32.2 is vulnerable to an insufficient permission check. This allows users with permissions to create new items (e.g. jobs) to overwrite existing items they don't have access to (SECURITY-321).

CVE-2018-1000153 jenkins vulnerability CVSS: 6.8 05 Apr 2018, 13:29 UTC

A cross-site request forgery vulnerability exists in Jenkins vSphere Plugin 2.16 and older in Clone.java, CloudSelectorParameter.java, ConvertToTemplate.java, ConvertToVm.java, Delete.java, DeleteSnapshot.java, Deploy.java, ExposeGuestInfo.java, FolderVSphereCloudProperty.java, PowerOff.java, PowerOn.java, Reconfigure.java, Rename.java, RenameSnapshot.java, RevertToSnapshot.java, SuspendVm.java, TakeSnapshot.java, VSphereBuildStepContainer.java, vSphereCloudProvisionedSlave.java, vSphereCloudSlave.java, vSphereCloudSlaveTemplate.java, VSphereConnectionConfig.java, vSphereStep.java that allows attackers to perform form validation related actions, including sending numerous requests to the configured vSphere server, potentially resulting in denial of service, or send credentials stored in Jenkins with known ID to an attacker-specified server ("test connection").

CVE-2018-1000152 jenkins vulnerability CVSS: 6.5 05 Apr 2018, 13:29 UTC

An improper authorization vulnerability exists in Jenkins vSphere Plugin 2.16 and older in Clone.java, CloudSelectorParameter.java, ConvertToTemplate.java, ConvertToVm.java, Delete.java, DeleteSnapshot.java, Deploy.java, ExposeGuestInfo.java, FolderVSphereCloudProperty.java, PowerOff.java, PowerOn.java, Reconfigure.java, Rename.java, RenameSnapshot.java, RevertToSnapshot.java, SuspendVm.java, TakeSnapshot.java, VSphereBuildStepContainer.java, vSphereCloudProvisionedSlave.java, vSphereCloudSlave.java, vSphereCloudSlaveTemplate.java, VSphereConnectionConfig.java, vSphereStep.java that allows attackers to perform form validation related actions, including sending numerous requests to the configured vSphere server, potentially resulting in denial of service, or send credentials stored in Jenkins with known ID to an attacker-specified server ("test connection").

CVE-2018-1000151 jenkins vulnerability CVSS: 6.8 05 Apr 2018, 13:29 UTC

A man in the middle vulnerability exists in Jenkins vSphere Plugin 2.16 and older in VSphere.java that disables SSL/TLS certificate validation by default.

CVE-2018-1000150 jenkins vulnerability CVSS: 2.1 05 Apr 2018, 13:29 UTC

An exposure of sensitive information vulnerability exists in Jenkins Reverse Proxy Auth Plugin 1.5 and older in ReverseProxySecurityRealm#authContext that allows attackers with local file system access to obtain a list of authorities for logged in users.

CVE-2018-1000149 jenkins vulnerability CVSS: 6.8 05 Apr 2018, 13:29 UTC

A man in the middle vulnerability exists in Jenkins Ansible Plugin 0.8 and older in AbstractAnsibleInvocation.java, AnsibleAdHocCommandBuilder.java, AnsibleAdHocCommandInvocationTest.java, AnsibleContext.java, AnsibleJobDslExtension.java, AnsiblePlaybookBuilder.java, AnsiblePlaybookStep.java that disables host key verification by default.

CVE-2018-1000148 jenkins vulnerability CVSS: 4.0 05 Apr 2018, 13:29 UTC

An exposure of sensitive information vulnerability exists in Jenkins Copy To Slave Plugin version 1.4.4 and older in CopyToSlaveBuildWrapper.java that allows attackers with permission to configure jobs to read arbitrary files from the Jenkins master file system.

CVE-2018-1000146 jenkins vulnerability CVSS: 6.5 05 Apr 2018, 13:29 UTC

An arbitrary code execution vulnerability exists in Liquibase Runner Plugin version 1.3.0 and older that allows an attacker with permission to configure jobs to load and execute arbitrary code on the Jenkins master JVM.

CVE-2018-1000145 jenkins vulnerability CVSS: 5.0 05 Apr 2018, 13:29 UTC

An exposure of sensitive information vulnerability exists in Jenkins Perforce Plugin version 1.3.36 and older in PerforcePasswordEncryptor.java that allows attackers with local file system access to obtain encrypted Perforce passwords and decrypt them.

CVE-2018-1000144 jenkins vulnerability CVSS: 4.3 05 Apr 2018, 13:29 UTC

A cross site scripting vulnerability exists in Jenkins Cucumber Living Documentation Plugin 1.0.12 and older in CukedoctorBaseAction#doDynamic that disables the Content-Security-Policy protection for archived artifacts and workspace files, allowing attackers able to control the content of these files to attack Jenkins users.

CVE-2018-1000143 jenkins vulnerability CVSS: 2.1 05 Apr 2018, 13:29 UTC

An exposure of sensitive information vulnerability exists in Jenkins GitHub Pull Request Builder Plugin version 1.39.0 and older in GhprbCause.java that allows an attacker with local file system access to obtain GitHub credentials.

CVE-2018-1000142 jenkins vulnerability CVSS: 2.1 05 Apr 2018, 13:29 UTC

An exposure of sensitive information vulnerability exists in Jenkins GitHub Pull Request Builder Plugin version 1.39.0 and older in GhprbCause.java that allows an attacker with local file system access to obtain GitHub credentials.

CVE-2018-8718 jenkins vulnerability CVSS: 6.0 27 Mar 2018, 16:29 UTC

Cross-site request forgery (CSRF) vulnerability in the Mailer Plugin 1.20 for Jenkins 2.111 allows remote authenticated users to send unauthorized mail as an arbitrary user via a /descriptorByName/hudson.tasks.Mailer/sendTestMail request.

CVE-2018-1000114 jenkins vulnerability CVSS: 4.0 13 Mar 2018, 13:29 UTC

An improper authorization vulnerability exists in Jenkins Promoted Builds Plugin 2.31.1 and earlier in Status.java and ManualCondition.java that allow an attacker with read access to jobs to perform promotions.

CVE-2018-1000113 jenkins vulnerability CVSS: 3.5 13 Mar 2018, 13:29 UTC

A cross-site scripting vulnerability exists in Jenkins TestLink Plugin 2.12 and earlier in TestLinkBuildAction/summary.jelly and others that allow an attacker who can control e.g. TestLink report names to have Jenkins serve arbitrary HTML and JavaScript

CVE-2018-1000112 jenkins vulnerability CVSS: 5.0 13 Mar 2018, 13:29 UTC

An improper authorization vulnerability exists in Jenkins Mercurial Plugin version 2.2 and earlier in MercurialStatus.java that allows an attacker with network access to obtain a list of nodes and users.

CVE-2018-1000111 jenkins vulnerability CVSS: 5.0 13 Mar 2018, 13:29 UTC

An improper authorization vulnerability exists in Jenkins Subversion Plugin version 2.10.2 and earlier in SubversionStatus.java and SubversionRepositoryStatus.java that allows an attacker with network access to obtain a list of nodes and users.

CVE-2018-1000110 jenkins vulnerability CVSS: 5.0 13 Mar 2018, 13:29 UTC

An improper authorization vulnerability exists in Jenkins Git Plugin version 3.7.0 and earlier in GitStatus.java that allows an attacker with network access to obtain a list of nodes and users.

CVE-2018-1000109 jenkins vulnerability CVSS: 4.0 13 Mar 2018, 13:29 UTC

An improper authorization vulnerability exists in Jenkins Google Play Android Publisher Plugin version 1.6 and earlier in GooglePlayBuildStepDescriptor.java that allow an attacker to obtain credential IDs.

CVE-2018-1000108 jenkins vulnerability CVSS: 4.3 13 Mar 2018, 13:29 UTC

A cross-site scripting vulnerability exists in Jenkins CppNCSS Plugin 1.1 and earlier in AbstractProjectAction/index.jelly that allow an attacker to craft links to Jenkins URLs that run arbitrary JavaScript in the user's browser when accessed.

CVE-2018-1000107 jenkins vulnerability CVSS: 4.0 13 Mar 2018, 13:29 UTC

An improper authorization vulnerability exists in Jenkins Job and Node Ownership Plugin 0.11.0 and earlier in OwnershipDescription.java, JobOwnerJobProperty.java, and OwnerNodeProperty.java that allow an attacker with Job/Configure or Computer/Configure permission and without Ownership related permissions to override ownership metadata.

CVE-2018-1000106 jenkins vulnerability CVSS: 5.5 13 Mar 2018, 13:29 UTC

An improper authorization vulnerability exists in Jenkins Gerrit Trigger Plugin 2.27.4 and earlier in GerritManagement.java, GerritServer.java, and PluginImpl.java that allows an attacker with Overall/Read access to modify the Gerrit configuration in Jenkins.

CVE-2018-1000105 jenkins vulnerability CVSS: 4.0 13 Mar 2018, 13:29 UTC

An improper authorization vulnerability exists in Jenkins Gerrit Trigger Plugin 2.27.4 and earlier in GerritManagement.java, GerritServer.java, and PluginImpl.java that allows an attacker with Overall/Read access to retrieve some configuration information about Gerrit in Jenkins.

CVE-2018-1000104 jenkins vulnerability CVSS: 2.1 13 Mar 2018, 13:29 UTC

A plaintext storage of a password vulnerability exists in Jenkins Coverity Plugin 1.10.0 and earlier in CIMInstance.java that allows an attacker with local file system access or control of a Jenkins administrator's web browser (e.g. malicious extension) to retrieve the configured keystore and private key passwords.

CVE-2018-6356 jenkins vulnerability CVSS: 4.0 20 Feb 2018, 15:29 UTC

Jenkins before 2.107 and Jenkins LTS before 2.89.4 did not properly prevent specifying relative paths that escape a base directory for URLs accessing plugin resource files. This allowed users with Overall/Read permission to download files from the Jenkins master they should not have access to. On Windows, any file accessible to the Jenkins master process could be downloaded. On other operating systems, any file within the Jenkins home directory accessible to the Jenkins master process could be downloaded.

CVE-2018-1000068 jenkins vulnerability CVSS: 5.0 16 Feb 2018, 00:29 UTC

An improper input validation vulnerability exists in Jenkins versions 2.106 and earlier, and LTS 2.89.3 and earlier, that allows an attacker to access plugin resource files in the META-INF and WEB-INF directories that should not be accessible, if the Jenkins home directory is on a case-insensitive file system.

CVE-2018-1000067 jenkins vulnerability CVSS: 5.0 16 Feb 2018, 00:29 UTC

An improper authorization vulnerability exists in Jenkins versions 2.106 and earlier, and LTS 2.89.3 and earlier, that allows an attacker to have Jenkins submit HTTP GET requests and get limited information about the response.

CVE-2018-1000058 jenkins vulnerability CVSS: 6.5 09 Feb 2018, 23:29 UTC

Jenkins Pipeline: Supporting APIs Plugin 2.17 and earlier have an arbitrary code execution due to incomplete sandbox protection: Methods related to Java deserialization like readResolve implemented in Pipeline scripts were not subject to sandbox protection, and could therefore execute arbitrary code. This could be exploited e.g. by regular Jenkins users with the permission to configure Pipelines in Jenkins, or by trusted committers to repositories containing Jenkinsfiles.

CVE-2018-1000057 jenkins vulnerability CVSS: 4.0 09 Feb 2018, 23:29 UTC

Jenkins Credentials Binding Plugin 1.14 and earlier masks passwords it provides to build processes in their build logs. Jenkins however transforms provided password values, e.g. replacing environment variable references, which could result in values different from but similar to configured passwords being provided to the build. Those values are not subject to masking, and could allow unauthorized users to recover the original password.

CVE-2018-1000056 jenkins vulnerability CVSS: 6.5 09 Feb 2018, 23:29 UTC

Jenkins JUnit Plugin 1.23 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.

CVE-2018-1000055 jenkins vulnerability CVSS: 6.5 09 Feb 2018, 23:29 UTC

Jenkins Android Lint Plugin 2.5 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.

CVE-2018-1000054 jenkins vulnerability CVSS: 6.5 09 Feb 2018, 23:29 UTC

Jenkins CCM Plugin 3.1 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.

CVE-2017-1000356 jenkins vulnerability CVSS: 6.8 29 Jan 2018, 17:29 UTC

Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an issue in the Jenkins user database authentication realm: create an account if signup is enabled; or create an account if the victim is an administrator, possibly deleting the existing default admin user in the process and allowing a wide variety of impacts.

CVE-2017-1000355 jenkins vulnerability CVSS: 4.0 29 Jan 2018, 17:29 UTC

Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an XStream: Java crash when trying to instantiate void/Void.

CVE-2017-1000354 jenkins vulnerability CVSS: 6.5 29 Jan 2018, 17:29 UTC

Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to a login command which allowed impersonating any Jenkins user. The `login` command available in the remoting-based CLI stored the encrypted user name of the successfully authenticated user in a cache file used to authenticate further commands. Users with sufficient permission to create secrets in Jenkins, and download their encrypted values (e.g. with Job/Configure permission), were able to impersonate any other Jenkins user on the same instance.

CVE-2017-1000353 jenkins vulnerability CVSS: 7.5 29 Jan 2018, 17:29 UTC

Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an unauthenticated remote code execution. An unauthenticated remote code execution vulnerability allowed attackers to transfer a serialized Java `SignedObject` object to the Jenkins CLI, that would be deserialized using a new `ObjectInputStream`, bypassing the existing blacklist-based protection mechanism. We're fixing this issue by adding `SignedObject` to the blacklist. We're also backporting the new HTTP CLI protocol from Jenkins 2.54 to LTS 2.46.2, and deprecating the remoting-based (i.e. Java serialization) CLI protocol, disabling it by default.

CVE-2017-1000404 jenkins vulnerability CVSS: 4.3 26 Jan 2018, 02:29 UTC

The Jenkins Delivery Pipeline Plugin version 1.0.7 and earlier used the unescaped content of the query parameter 'fullscreen' in its JavaScript, resulting in a cross-site scripting vulnerability through specially crafted URLs.

CVE-2017-1000403 jenkins vulnerability CVSS: 6.5 26 Jan 2018, 02:29 UTC

Jenkins Speaks! Plugin, all current versions, allows users with Job/Configure permission to run arbitrary Groovy code inside the Jenkins JVM, effectively elevating privileges to Overall/Run Scripts.

CVE-2017-1000402 jenkins vulnerability CVSS: 4.3 26 Jan 2018, 02:29 UTC

Jenkins Swarm Plugin Client 3.4 and earlier bundled a version of the commons-httpclient library with the vulnerability CVE-2012-6153 that incorrectly verified SSL certificates, making it susceptible to man-in-the-middle attacks.

CVE-2017-1000401 jenkins vulnerability CVSS: 1.2 26 Jan 2018, 02:29 UTC

The Jenkins 2.73.1 and earlier, 2.83 and earlier default form control for passwords and other secrets, <f:password/>, supports form validation (e.g. for API keys). The form validation AJAX requests were sent via GET, which could result in secrets being logged to a HTTP access log in non-default configurations of Jenkins, and made available to users with access to these log files. Form validation for <f:password/> is now always sent via POST, which is typically not logged.

CVE-2017-1000400 jenkins vulnerability CVSS: 4.0 26 Jan 2018, 02:29 UTC

The Jenkins 2.73.1 and earlier, 2.83 and earlier remote API at /job/(job-name)/api contained information about upstream and downstream projects. This included information about tasks that the current user otherwise has no access to, e.g. due to lack of Item/Read permission. This has been fixed, and the API now only lists upstream and downstream projects that the current user has access to.

CVE-2017-1000399 jenkins vulnerability CVSS: 4.0 26 Jan 2018, 02:29 UTC

The Jenkins 2.73.1 and earlier, 2.83 and earlier remote API at /queue/item/(ID)/api showed information about tasks in the queue (typically builds waiting to start). This included information about tasks that the current user otherwise has no access to, e.g. due to lack of Item/Read permission. This has been fixed, and the API endpoint is now only available for tasks that the current user has access to.

CVE-2017-1000398 jenkins vulnerability CVSS: 4.0 26 Jan 2018, 02:29 UTC

The remote API in Jenkins 2.73.1 and earlier, 2.83 and earlier at /computer/(agent-name)/api showed information about tasks (typically builds) currently running on that agent. This included information about tasks that the current user otherwise has no access to, e.g. due to lack of Item/Read permission. This has been fixed, and the API now only shows information about accessible tasks.

CVE-2017-1000397 jenkins vulnerability CVSS: 4.3 26 Jan 2018, 02:29 UTC

Jenkins Maven Plugin 2.17 and earlier bundled a version of the commons-httpclient library with the vulnerability CVE-2012-6153 that incorrectly verified SSL certificates, making it susceptible to man-in-the-middle attacks. Maven Plugin 3.0 no longer has a dependency on commons-httpclient.

CVE-2017-1000396 jenkins vulnerability CVSS: 4.3 26 Jan 2018, 02:29 UTC

Jenkins 2.73.1 and earlier, 2.83 and earlier bundled a version of the commons-httpclient library with the vulnerability CVE-2012-6153 that incorrectly verified SSL certificates, making it susceptible to man-in-the-middle attacks. This library is widely used as a transitive dependency in Jenkins plugins. The fix for CVE-2012-6153 was backported to the version of commons-httpclient that is bundled in core and made available to plugins.

CVE-2017-1000395 jenkins vulnerability CVSS: 4.0 26 Jan 2018, 02:29 UTC

Jenkins 2.73.1 and earlier, 2.83 and earlier provides information about Jenkins user accounts which is generally available to anyone with Overall/Read permissions via the /user/(username)/api remote API. This included e.g. Jenkins users' email addresses if the Mailer Plugin is installed. The remote API now no longer includes information beyond the most basic (user ID and name) unless the user requesting it is a Jenkins administrator.

CVE-2017-1000394 jenkins vulnerability CVSS: 5.0 26 Jan 2018, 02:29 UTC

Jenkins 2.73.1 and earlier, 2.83 and earlier bundled a version of the commons-fileupload library with the denial-of-service vulnerability known as CVE-2016-3092. The fix for that vulnerability has been backported to the version of the library bundled with Jenkins.

CVE-2017-1000393 jenkins vulnerability CVSS: 9.0 26 Jan 2018, 02:29 UTC

Jenkins 2.73.1 and earlier, 2.83 and earlier users with permission to create or configure agents in Jenkins could configure a launch method called 'Launch agent via execution of command on master'. This allowed them to run arbitrary shell commands on the master node whenever the agent was supposed to be launched. Configuration of this launch method now requires the Run Scripts permission typically only granted to administrators.

CVE-2017-1000392 jenkins vulnerability CVSS: 3.5 26 Jan 2018, 02:29 UTC

Jenkins 2.88 and earlier; 2.73.2 and earlier Autocompletion suggestions for text fields were not escaped, resulting in a persisted cross-site scripting vulnerability if the source for the suggestions allowed specifying text that includes HTML metacharacters like less-than and greater-than characters.

CVE-2017-1000391 jenkins vulnerability CVSS: 4.9 26 Jan 2018, 02:29 UTC

Jenkins versions 2.88 and earlier and 2.73.2 and earlier stores metadata related to 'people', which encompasses actual user accounts, as well as users appearing in SCM, in directories corresponding to the user ID on disk. These directories used the user ID for their name without additional escaping, potentially resulting in problems like overwriting of unrelated configuration files.

CVE-2017-1000390 jenkins vulnerability CVSS: 4.0 26 Jan 2018, 02:29 UTC

Jenkins Multijob plugin version 1.25 and earlier did not check permissions in the Resume Build action, allowing anyone with Job/Read permission to resume the build.

CVE-2017-1000389 jenkins vulnerability CVSS: 4.3 26 Jan 2018, 02:29 UTC

Some URLs provided by Jenkins global-build-stats plugin version 1.4 and earlier returned a JSON response that contained request parameters. These responses had the Content Type: text/html, so could have been interpreted as HTML by clients, resulting in a potential reflected cross-site scripting vulnerability. Additionally, some URLs provided by global-build-stats plugin that modify data did not require POST requests to be sent, resulting in a potential cross-site request forgery vulnerability.

CVE-2017-1000388 jenkins vulnerability CVSS: 4.0 26 Jan 2018, 02:29 UTC

Jenkins Dependency Graph Viewer plugin 0.12 and earlier did not perform permission checks for the API endpoint that modifies the dependency graph, allowing anyone with Overall/Read permission to modify this data.

CVE-2017-1000387 jenkins vulnerability CVSS: 2.1 26 Jan 2018, 02:29 UTC

Jenkins Build-Publisher plugin version 1.21 and earlier stores credentials to other Jenkins instances in the file hudson.plugins.build_publisher.BuildPublisher.xml in the Jenkins master home directory. These credentials were stored unencrypted, allowing anyone with local file system access to access them. Additionally, the credentials were also transmitted in plain text as part of the configuration form. This could result in exposure of the credentials through browser extensions, cross-site scripting vulnerabilities, and similar situations.

CVE-2017-1000386 jenkins vulnerability CVSS: 3.5 26 Jan 2018, 02:29 UTC

Jenkins Active Choices plugin version 1.5.3 and earlier allowed users with Job/Configure permission to provide arbitrary HTML to be shown on the 'Build With Parameters' page through the 'Active Choices Reactive Reference Parameter' type. This could include, for example, arbitrary JavaScript. Active Choices now sanitizes the HTML inserted on the 'Build With Parameters' page if and only if the script is executed in a sandbox. As unsandboxed scripts are subject to administrator approval, it is up to the administrator to allow or disallow problematic script output.

CVE-2017-1000505 jenkins vulnerability CVSS: 4.0 25 Jan 2018, 18:29 UTC

In Jenkins Script Security Plugin version 1.36 and earlier, users with the ability to configure sandboxed Groovy scripts are able to use a type coercion feature in Groovy to create new `File` objects from strings. This allowed reading arbitrary files on the Jenkins master file system. Such a type coercion is now subject to sandbox protection and considered to be a call to the `new File(String)` constructor for the purpose of in-process script approval.

CVE-2017-1000504 jenkins vulnerability CVSS: 6.8 24 Jan 2018, 23:29 UTC

A race condition during Jenkins 2.94 and earlier; 2.89.1 and earlier startup could result in the wrong order of execution of commands during initialization. There is a very short window of time after startup during which Jenkins may no longer show the 'Please wait while Jenkins is getting ready to work' message but Cross-Site Request Forgery (CSRF) protection may not yet be effective.

CVE-2017-1000503 jenkins vulnerability CVSS: 6.8 24 Jan 2018, 23:29 UTC

A race condition during Jenkins 2.81 through 2.94 (inclusive); 2.89.1 startup could result in the wrong order of execution of commands during initialization. This could in rare cases result in failure to initialize the setup wizard on the first startup. This resulted in multiple security-related settings not being set to their usual strict default.

CVE-2017-1000502 jenkins vulnerability CVSS: 9.0 24 Jan 2018, 23:29 UTC

Users with permission to create or configure agents in Jenkins 1.37 and earlier could configure an EC2 agent to run arbitrary shell commands on the master node whenever the agent was supposed to be launched. Configuration of these agents now requires the 'Run Scripts' permission typically only granted to administrators.

CVE-2018-1000015 jenkins vulnerability CVSS: 4.9 23 Jan 2018, 14:29 UTC

On Jenkins instances with Authorize Project plugin, the authentication associated with a build may lack the Computer/Build permission on some agents. This did not prevent the execution of Pipeline `node` blocks on those agents due to incorrect permissions checks in Pipeline: Nodes and Processes plugin 2.17 and earlier.

CVE-2018-1000014 jenkins vulnerability CVSS: 6.8 23 Jan 2018, 14:29 UTC

Jenkins Translation Assistance Plugin 1.15 and earlier did not require form submissions to be submitted via POST, resulting in a CSRF vulnerability allowing attackers to override localized strings displayed to all users on the current Jenkins instance if the victim is a Jenkins administrator.

CVE-2018-1000013 jenkins vulnerability CVSS: 6.8 23 Jan 2018, 14:29 UTC

Jenkins Release Plugin 2.9 and earlier did not require form submissions to be submitted via POST, resulting in a CSRF vulnerability allowing attackers to trigger release builds.

CVE-2018-1000012 jenkins vulnerability CVSS: 6.5 23 Jan 2018, 14:29 UTC

Jenkins Warnings Plugin 4.64 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.

CVE-2018-1000011 jenkins vulnerability CVSS: 6.5 23 Jan 2018, 14:29 UTC

Jenkins FindBugs Plugin 4.71 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.

CVE-2018-1000010 jenkins vulnerability CVSS: 6.5 23 Jan 2018, 14:29 UTC

Jenkins DRY Plugin 2.49 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.

CVE-2018-1000009 jenkins vulnerability CVSS: 6.5 23 Jan 2018, 14:29 UTC

Jenkins Checkstyle Plugin 3.49 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.

CVE-2018-1000008 jenkins vulnerability CVSS: 6.5 23 Jan 2018, 14:29 UTC

Jenkins PMD Plugin 3.49 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.

CVE-2017-17383 jenkins vulnerability CVSS: 3.5 06 Dec 2017, 05:29 UTC

Jenkins through 2.93 allows remote authenticated administrators to conduct XSS attacks via a crafted tool name in a job configuration form, as demonstrated by the JDK tool in Jenkins core and the Ant tool in the Ant plugin, aka SECURITY-624.

CVE-2017-1000245 jenkins vulnerability CVSS: 5.0 01 Nov 2017, 13:29 UTC

The SSH Plugin stores credentials which allow jobs to access remote servers via the SSH protocol. User passwords and passphrases for encrypted SSH keys are stored in plaintext in a configuration file.

CVE-2017-1000244 jenkins vulnerability CVSS: 6.8 01 Nov 2017, 13:29 UTC

Jenkins Favorite Plugin version 2.2.0 and older is vulnerable to CSRF resulting in data modification

CVE-2017-1000243 jenkins vulnerability CVSS: 4.0 01 Nov 2017, 13:29 UTC

Jenkins Favorite Plugin 2.1.4 and older does not perform permission checks when changing favorite status, allowing any user to set any other user's favorites

CVE-2017-1000242 jenkins vulnerability CVSS: 2.1 01 Nov 2017, 13:29 UTC

Jenkins Git Client Plugin 2.4.2 and earlier creates temporary file with insecure permissions resulting in information disclosure

CVE-2017-1000114 jenkins vulnerability CVSS: 4.3 05 Oct 2017, 01:29 UTC

The Datadog Plugin stores an API key to access the Datadog service in the global Jenkins configuration. While the API key is stored encrypted on disk, it was transmitted in plain text as part of the configuration form. This could result in exposure of the API key for example through browser extensions or cross-site scripting vulnerabilities. The Datadog Plugin now encrypts the API key transmitted to administrators viewing the global configuration form.

CVE-2017-1000113 jenkins vulnerability CVSS: 2.1 05 Oct 2017, 01:29 UTC

The Deploy to container Plugin stored passwords unencrypted as part of its configuration. This allowed users with Jenkins master local file system access, or users with Extended Read access to the jobs it is used in, to retrieve those passwords. The Deploy to container Plugin now integrates with Credentials Plugin to store passwords securely, and automatically migrates existing passwords.

CVE-2017-1000110 jenkins vulnerability CVSS: 4.0 05 Oct 2017, 01:29 UTC

Blue Ocean allows the creation of GitHub organization folders that are set up to scan a GitHub organization for repositories and branches containing a Jenkinsfile, and create corresponding pipelines in Jenkins. It did not properly check the current user's authentication and authorization when configuring existing GitHub organization folders. This allowed users with read access to the GitHub organization folder to reconfigure it, including changing the GitHub API endpoint for the organization folder to an attacker-controlled server to obtain the GitHub access token, if the organization folder was initially created using Blue Ocean.

CVE-2017-1000109 jenkins vulnerability CVSS: 4.3 05 Oct 2017, 01:29 UTC

The custom Details view of the Static Analysis Utilities based OWASP Dependency-Check Plugin, was vulnerable to a persisted cross-site scripting vulnerability: Malicious users able to influence the input to this plugin could insert arbitrary HTML into this view.

CVE-2017-1000108 jenkins vulnerability CVSS: 5.0 05 Oct 2017, 01:29 UTC

The Pipeline: Input Step Plugin by default allowed users with Item/Read access to a pipeline to interact with the step to provide input. This has been changed, and now requires users to have the Item/Build permission instead.

CVE-2017-1000107 jenkins vulnerability CVSS: 6.5 05 Oct 2017, 01:29 UTC

Script Security Plugin did not apply sandboxing restrictions to constructor invocations via positional arguments list, super constructor invocations, method references, and type coercion expressions. This could be used to invoke arbitrary constructors and methods, bypassing sandbox protection.

CVE-2017-1000106 jenkins vulnerability CVSS: 5.5 05 Oct 2017, 01:29 UTC

Blue Ocean allows the creation of GitHub organization folders that are set up to scan a GitHub organization for repositories and branches containing a Jenkinsfile, and create corresponding pipelines in Jenkins. Its SCM content REST API supports the pipeline creation and editing feature in Blue Ocean. The SCM content REST API did not check the current user's authentication or credentials. If the GitHub organization folder was created via Blue Ocean, it retained a reference to its creator's GitHub credentials. This allowed users with read access to the GitHub organization folder to create arbitrary commits in the repositories inside the GitHub organization corresponding to the GitHub organization folder with the GitHub credentials of the creator of the organization folder. Additionally, users with read access to the GitHub organization folder could read arbitrary file contents from the repositories inside the GitHub organization corresponding to the GitHub organization folder if the branch contained a Jenkinsfile (which could be created using the other part of this vulnerability), and they could provide the organization folder name, repository name, branch name, and file name.

CVE-2017-1000105 jenkins vulnerability CVSS: 5.0 05 Oct 2017, 01:29 UTC

The optional Run/Artifacts permission can be enabled by setting a Java system property. Blue Ocean did not check this permission before providing access to archived artifacts, Item/Read permission was sufficient.

CVE-2017-1000104 jenkins vulnerability CVSS: 4.0 05 Oct 2017, 01:29 UTC

The Config File Provider Plugin is used to centrally manage configuration files that often include secrets, such as passwords. Users with only Overall/Read access to Jenkins were able to access URLs directly that allowed viewing these files. Access to view these files now requires sufficient permissions to configure the provided files, view the configuration of the folder in which the configuration files are defined, or have Job/Configure permissions to a job able to use these files.

CVE-2017-1000103 jenkins vulnerability CVSS: 3.5 05 Oct 2017, 01:29 UTC

The custom Details view of the Static Analysis Utilities based DRY Plugin, was vulnerable to a persisted cross-site scripting vulnerability: Malicious users able to influence the input to this plugin could insert arbitrary HTML into this view.

CVE-2017-1000102 jenkins vulnerability CVSS: 3.5 05 Oct 2017, 01:29 UTC

The Details view of some Static Analysis Utilities based plugins, was vulnerable to a persisted cross-site scripting vulnerability: Malicious users able to influence the input to these plugins, for example the console output which is parsed to extract build warnings (Warnings Plugin), could insert arbitrary HTML into this view.

CVE-2017-1000096 jenkins vulnerability CVSS: 6.5 05 Oct 2017, 01:29 UTC

Arbitrary code execution due to incomplete sandbox protection: Constructors, instance variable initializers, and instance initializers in Pipeline scripts were not subject to sandbox protection, and could therefore execute arbitrary code. This could be exploited e.g. by regular Jenkins users with the permission to configure Pipelines in Jenkins, or by trusted committers to repositories containing Jenkinsfiles.

CVE-2017-1000095 jenkins vulnerability CVSS: 4.0 05 Oct 2017, 01:29 UTC

The default whitelist included the following unsafe entries: DefaultGroovyMethods.putAt(Object, String, Object); DefaultGroovyMethods.getAt(Object, String). These allowed circumventing many of the access restrictions implemented in the script sandbox by using e.g. currentBuild['rawBuild'] rather than currentBuild.rawBuild. Additionally, the following entries allowed accessing private data that would not be accessible otherwise due to script security: groovy.json.JsonOutput.toJson(Closure); groovy.json.JsonOutput.toJson(Object).

CVE-2017-1000094 jenkins vulnerability CVSS: 4.0 05 Oct 2017, 01:29 UTC

Docker Commons Plugin provides a list of applicable credential IDs to allow users configuring a job to select the one they'd like to use to authenticate with a Docker Registry. This functionality did not check permissions, allowing any user with Overall/Read permission to get a list of valid credentials IDs. Those could be used as part of an attack to capture the credentials using another vulnerability.

CVE-2017-1000093 jenkins vulnerability CVSS: 6.8 05 Oct 2017, 01:29 UTC

Poll SCM Plugin was not requiring requests to its API be sent via POST, thereby opening itself to Cross-Site Request Forgery attacks. This allowed attackers to initiate polling of projects with a known name. While Jenkins in general does not consider polling to be a protection-worthy action as it's similar to cache invalidation, the plugin specifically adds a permission to be able to use this functionality, and this issue undermines that permission.

CVE-2017-1000092 jenkins vulnerability CVSS: 2.6 05 Oct 2017, 01:29 UTC

Git Plugin connects to a user-specified Git repository as part of form validation. An attacker with no direct access to Jenkins but able to guess at a username/password credentials ID could trick a developer with job configuration permissions into following a link with a maliciously crafted Jenkins URL which would result in the Jenkins Git client sending the username and password to an attacker-controlled server.

CVE-2017-1000091 jenkins vulnerability CVSS: 6.8 05 Oct 2017, 01:29 UTC

GitHub Branch Source Plugin connects to a user-specified GitHub API URL (e.g. GitHub Enterprise) as part of form validation and completion (e.g. to verify Scan Credentials are correct). This functionality improperly checked permissions, allowing any user with Overall/Read access to Jenkins to connect to any web server and send credentials with a known ID, thereby possibly capturing them. Additionally, this functionality did not require POST requests be used, thereby allowing the above to be performed without direct access to Jenkins via Cross-Site Request Forgery.

CVE-2017-1000090 jenkins vulnerability CVSS: 6.8 05 Oct 2017, 01:29 UTC

Role-based Authorization Strategy Plugin was not requiring requests to its API be sent via POST, thereby opening itself to Cross-Site Request Forgery attacks. This allowed attackers to add administrator role to any user, or to remove the authorization configuration, preventing legitimate access to Jenkins.

CVE-2017-1000089 jenkins vulnerability CVSS: 5.0 05 Oct 2017, 01:29 UTC

Builds in Jenkins are associated with an authentication that controls the permissions that the build has to interact with other elements in Jenkins. The Pipeline: Build Step Plugin did not check the build authentication it was running as and allowed triggering any other project in Jenkins.

CVE-2017-1000088 jenkins vulnerability CVSS: 3.5 05 Oct 2017, 01:29 UTC

The Sidebar Link plugin allows users able to configure jobs, views, and agents to add entries to the sidebar of these objects. There was no input validation, which meant users were able to use javascript: schemes for these links.

CVE-2017-1000087 jenkins vulnerability CVSS: 4.0 05 Oct 2017, 01:29 UTC

GitHub Branch Source provides a list of applicable credential IDs to allow users configuring a job to select the one they'd like to use. This functionality did not check permissions, allowing any user with Overall/Read permission to get a list of valid credentials IDs. Those could be used as part of an attack to capture the credentials using another vulnerability.

CVE-2017-1000086 jenkins vulnerability CVSS: 6.0 05 Oct 2017, 01:29 UTC

The Periodic Backup Plugin did not perform any permission checks, allowing any user with Overall/Read access to change its settings, trigger backups, restore backups, download backups, and also delete all previous backups via log rotation. Additionally, the plugin was not requiring requests to its API be sent via POST, thereby opening itself to Cross-Site Request Forgery attacks.

CVE-2017-1000085 jenkins vulnerability CVSS: 4.3 05 Oct 2017, 01:29 UTC

Subversion Plugin connects to a user-specified Subversion repository as part of form validation (e.g. to retrieve a list of tags). This functionality improperly checked permissions, allowing any user with Item/Build permission (but not Item/Configure) to connect to any web server or Subversion server and send credentials with a known ID, thereby possibly capturing them. Additionally, this functionality did not require POST requests be used, thereby allowing the above to be performed without direct access to Jenkins via Cross-Site Request Forgery attacks.

CVE-2017-1000084 jenkins vulnerability CVSS: 4.0 05 Oct 2017, 01:29 UTC

Parameterized Trigger Plugin fails to check Item/Build permission: The Parameterized Trigger Plugin did not check the build authentication it was running as and allowed triggering any other project in Jenkins.

CVE-2014-9635 jenkins vulnerability CVSS: 5.0 12 Sep 2017, 14:29 UTC

Jenkins before 1.586 does not set the HttpOnly flag in a Set-Cookie header for session cookies when run on Tomcat 7.0.41 or later, which makes it easier for remote attackers to obtain potentially sensitive information via script access to cookies.

CVE-2014-9634 jenkins vulnerability CVSS: 5.0 12 Sep 2017, 14:29 UTC

Jenkins before 1.586 does not set the secure flag on session cookies when run on Tomcat 7.0.41 or later, which makes it easier for remote attackers to capture cookies by intercepting their transmission within an HTTP session.

CVE-2017-1000362 jenkins vulnerability CVSS: 5.0 17 Jul 2017, 13:18 UTC

The re-key admin monitor was introduced in Jenkins 1.498 and re-encrypted all secrets in JENKINS_HOME with a new key. It also created a backup directory with all old secrets, and the key used to encrypt them. These backups were world-readable and not removed afterwards. Jenkins now deletes the backup directory, if present. Upgrading from before 1.498 will no longer create a backup directory. Administrators relying on file access permissions in their manually created backups are advised to check them for the directory $JENKINS_HOME/jenkins.security.RekeySecretAdminMonitor/backups, and delete it if present.

CVE-2016-4988 jenkins vulnerability CVSS: 4.3 09 Feb 2017, 15:59 UTC

Cross-site scripting (XSS) vulnerability in the Build Failure Analyzer plugin before 1.16.0 in Jenkins allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter.

CVE-2016-4987 jenkins vulnerability CVSS: 4.0 09 Feb 2017, 15:59 UTC

Directory traversal vulnerability in the Image Gallery plugin before 1.4 in Jenkins allows remote attackers to list arbitrary directories and read arbitrary files via unspecified form fields.

CVE-2016-4986 jenkins vulnerability CVSS: 5.0 09 Feb 2017, 15:59 UTC

Directory traversal vulnerability in the TAP plugin before 1.25 in Jenkins allows remote attackers to read arbitrary files via an unspecified parameter.

CVE-2016-3102 jenkins vulnerability CVSS: 7.5 09 Feb 2017, 15:59 UTC

The Script Security plugin before 1.18.1 in Jenkins might allow remote attackers to bypass a Groovy sandbox protection mechanism via a plugin that performs (1) direct field access or (2) get/set array operations.

CVE-2016-3101 jenkins vulnerability CVSS: 3.5 09 Feb 2017, 15:59 UTC

Cross-site scripting (XSS) vulnerability in the Extra Columns plugin before 1.17 in Jenkins allows remote attackers to inject arbitrary web script or HTML by leveraging failure to filter tool tips through the configured markup formatter.

CVE-2016-9299 jenkins vulnerability CVSS: 7.5 12 Jan 2017, 23:59 UTC

The remoting module in Jenkins before 2.32 and LTS before 2.19.3 allows remote attackers to execute arbitrary code via a crafted serialized Java object, which triggers an LDAP query to a third-party server.

CVE-2016-3727 jenkins vulnerability CVSS: 4.0 17 May 2016, 14:08 UTC

The API URL computer/(master)/api/xml in Jenkins before 2.3 and LTS before 1.651.2 allows remote authenticated users with extended read permission for the master node to obtain sensitive information about the global configuration via unspecified vectors.

CVE-2016-3726 jenkins vulnerability CVSS: 5.8 17 May 2016, 14:08 UTC

Multiple open redirect vulnerabilities in Jenkins before 2.3 and LTS before 1.651.2 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors related to "scheme-relative" URLs.

CVE-2016-3725 jenkins vulnerability CVSS: 5.0 17 May 2016, 14:08 UTC

Jenkins before 2.3 and LTS before 1.651.2 allows remote authenticated users to trigger updating of update site metadata by leveraging a missing permissions check. NOTE: this issue can be combined with DNS cache poisoning to cause a denial of service (service disruption).

CVE-2016-3724 jenkins vulnerability CVSS: 4.0 17 May 2016, 14:08 UTC

Jenkins before 2.3 and LTS before 1.651.2 allow remote authenticated users with extended read access to obtain sensitive password information by reading a job configuration.

CVE-2016-3723 jenkins vulnerability CVSS: 4.0 17 May 2016, 14:08 UTC

Jenkins before 2.3 and LTS before 1.651.2 allow remote authenticated users with read access to obtain sensitive plugin installation information by leveraging missing permissions checks in unspecified XML/JSON API endpoints.

CVE-2016-3722 jenkins vulnerability CVSS: 4.0 17 May 2016, 14:08 UTC

Jenkins before 2.3 and LTS before 1.651.2 allow remote authenticated users with multiple accounts to cause a denial of service (unable to login) by editing the "full name."

CVE-2016-3721 jenkins vulnerability CVSS: 4.0 17 May 2016, 14:08 UTC

Jenkins before 2.3 and LTS before 1.651.2 might allow remote authenticated users to inject arbitrary build parameters into the build environment via environment variables.

CVE-2016-0792 jenkins vulnerability CVSS: 9.0 07 Apr 2016, 23:59 UTC

Multiple unspecified API endpoints in Jenkins before 1.650 and LTS before 1.642.2 allow remote authenticated users to execute arbitrary code via serialized data in an XML file, related to XStream and groovy.util.Expando.

CVE-2016-0791 jenkins vulnerability CVSS: 7.5 07 Apr 2016, 23:59 UTC

Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify CSRF tokens, which makes it easier for remote attackers to bypass a CSRF protection mechanism via a brute-force approach.

CVE-2016-0790 jenkins vulnerability CVSS: 5.0 07 Apr 2016, 23:59 UTC

Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify API tokens, which makes it easier for remote attackers to determine API tokens via a brute-force approach.

CVE-2016-0789 jenkins vulnerability CVSS: 4.3 07 Apr 2016, 23:59 UTC

CRLF injection vulnerability in the CLI command documentation in Jenkins before 1.650 and LTS before 1.642.2 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.

CVE-2016-0788 jenkins vulnerability CVSS: 10.0 07 Apr 2016, 23:59 UTC

The remoting module in Jenkins before 1.650 and LTS before 1.642.2 allows remote attackers to execute arbitrary code by opening a JRMP listener.

CVE-2015-7539 jenkins vulnerability CVSS: 7.6 03 Feb 2016, 18:59 UTC

The Plugins Manager in Jenkins before 1.640 and LTS before 1.625.2 does not verify checksums for plugin files referenced in update site data, which makes it easier for man-in-the-middle attackers to execute arbitrary code via a crafted plugin.

CVE-2015-7538 jenkins vulnerability CVSS: 6.8 03 Feb 2016, 18:59 UTC

Jenkins before 1.640 and LTS before 1.625.2 allow remote attackers to bypass the CSRF protection mechanism via unspecified vectors.

CVE-2015-7537 jenkins vulnerability CVSS: 6.8 03 Feb 2016, 18:59 UTC

Cross-site request forgery (CSRF) vulnerability in Jenkins before 1.640 and LTS before 1.625.2 allows remote attackers to hijack the authentication of administrators for requests that have unspecified impact via vectors related to the HTTP GET method.

CVE-2015-7536 jenkins vulnerability CVSS: 3.5 03 Feb 2016, 18:59 UTC

Cross-site scripting (XSS) vulnerability in Jenkins before 1.640 and LTS before 1.625.2 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors related to workspaces and archived artifacts.

CVE-2015-8103 jenkins vulnerability CVSS: 7.5 25 Nov 2015, 20:59 UTC

The Jenkins CLI subsystem in Jenkins before 1.638 and LTS before 1.625.2 allows remote attackers to execute arbitrary code via a crafted serialized Java object, related to a problematic webapps/ROOT/WEB-INF/lib/commons-collections-*.jar file and the "Groovy variant in 'ysoserial'".

CVE-2015-5326 jenkins vulnerability CVSS: 4.3 25 Nov 2015, 20:59 UTC

Cross-site scripting (XSS) vulnerability in the slave overview page in Jenkins before 1.638 and LTS before 1.625.2 allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via the slave offline status message.

CVE-2015-5325 jenkins vulnerability CVSS: 7.5 25 Nov 2015, 20:59 UTC

Jenkins before 1.638 and LTS before 1.625.2 allow attackers to bypass intended slave-to-master access restrictions by leveraging a JNLP slave. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3665.

CVE-2015-5324 jenkins vulnerability CVSS: 5.0 25 Nov 2015, 20:59 UTC

Jenkins before 1.638 and LTS before 1.625.2 allow remote attackers to obtain sensitive information via a direct request to queue/api.

CVE-2015-5323 jenkins vulnerability CVSS: 6.5 25 Nov 2015, 20:59 UTC

Jenkins before 1.638 and LTS before 1.625.2 do not properly restrict access to API tokens which might allow remote administrators to gain privileges and run scripts by using an API token of another user.

CVE-2015-5322 jenkins vulnerability CVSS: 5.0 25 Nov 2015, 20:59 UTC

Directory traversal vulnerability in Jenkins before 1.638 and LTS before 1.625.2 allows remote attackers to list directory contents and read arbitrary files in the Jenkins servlet resources via directory traversal sequences in a request to jnlpJars/.

CVE-2015-5321 jenkins vulnerability CVSS: 5.0 25 Nov 2015, 20:59 UTC

The sidepanel widgets in the CLI command overview and help pages in Jenkins before 1.638 and LTS before 1.625.2 allow remote attackers to obtain sensitive information via a direct request to the pages.

CVE-2015-5320 jenkins vulnerability CVSS: 5.0 25 Nov 2015, 20:59 UTC

Jenkins before 1.638 and LTS before 1.625.2 do not properly verify the shared secret used in JNLP slave connections, which allows remote attackers to connect as slaves and obtain sensitive information or possibly gain administrative access by leveraging knowledge of the name of a slave.

CVE-2015-5319 jenkins vulnerability CVSS: 5.0 25 Nov 2015, 20:59 UTC

XML external entity (XXE) vulnerability in the create-job CLI command in Jenkins before 1.638 and LTS before 1.625.2 allows remote attackers to read arbitrary files via a crafted job configuration that is then used in an "XML-aware tool," as demonstrated by get-job and update-job.

CVE-2015-5318 jenkins vulnerability CVSS: 6.8 25 Nov 2015, 20:59 UTC

Jenkins before 1.638 and LTS before 1.625.2 uses a publicly accessible salt to generate CSRF protection tokens, which makes it easier for remote attackers to bypass the CSRF protection mechanism via a brute force attack.

CVE-2015-5317 jenkins vulnerability CVSS: 5.0 25 Nov 2015, 20:59 UTC

The Fingerprints pages in Jenkins before 1.638 and LTS before 1.625.2 might allow remote attackers to obtain sensitive job and build name information via a direct request.

CVE-2014-3665 jenkins vulnerability CVSS: 6.8 25 Nov 2015, 20:59 UTC

Jenkins before 1.587 and LTS before 1.580.1 do not properly ensure trust separation between a master and slaves, which might allow remote attackers to execute arbitrary code on the master by leveraging access to the slave.

CVE-2015-1814 jenkins vulnerability CVSS: 7.5 16 Oct 2015, 20:59 UTC

The API token-issuing service in Jenkins before 1.606 and LTS before 1.596.2 allows remote attackers to gain privileges via a "forced API token change" involving anonymous users.

CVE-2015-1813 jenkins vulnerability CVSS: 4.3 16 Oct 2015, 20:59 UTC

Cross-site scripting (XSS) vulnerability in Jenkins before 1.606 and LTS before 1.596.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2015-1812.

CVE-2015-1812 jenkins vulnerability CVSS: 4.3 16 Oct 2015, 20:59 UTC

Cross-site scripting (XSS) vulnerability in Jenkins before 1.606 and LTS before 1.596.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2015-1813.

CVE-2015-1810 jenkins vulnerability CVSS: 4.6 16 Oct 2015, 20:59 UTC

The HudsonPrivateSecurityRealm class in Jenkins before 1.600 and LTS before 1.596.1 does not restrict access to reserved names when using the "Jenkins' own user database" setting, which allows remote attackers to gain privileges by creating a reserved name.

CVE-2015-1808 jenkins vulnerability CVSS: 3.5 16 Oct 2015, 20:59 UTC

Jenkins before 1.600 and LTS before 1.596.1 allows remote authenticated users to cause a denial of service (improper plug-in and tool installation) via crafted update center data.

CVE-2015-1807 jenkins vulnerability CVSS: 3.5 16 Oct 2015, 20:59 UTC

Directory traversal vulnerability in Jenkins before 1.600 and LTS before 1.596.1 allows remote authenticated users with certain permissions to read arbitrary files via a symlink, related to building artifacts.

CVE-2015-1806 jenkins vulnerability CVSS: 6.5 16 Oct 2015, 20:59 UTC

The combination filter Groovy script in Jenkins before 1.600 and LTS before 1.596.1 allows remote authenticated users with job configuration permission to gain privileges and execute arbitrary code on the master via unspecified vectors.

CVE-2014-2068 jenkins vulnerability CVSS: 3.5 17 Oct 2014, 15:55 UTC

The doIndex function in hudson/util/RemotingDiagnostics.java in CloudBees Jenkins before 1.551 and LTS before 1.532.2 allows remote authenticated users with the ADMINISTER permission to obtain sensitive information via vectors related to heapDump.

CVE-2014-2066 jenkins vulnerability CVSS: 6.8 17 Oct 2014, 15:55 UTC

Session fixation vulnerability in Jenkins before 1.551 and LTS before 1.532.2 allows remote attackers to hijack web sessions via vectors involving the "override" of Jenkins cookies.

CVE-2014-2065 jenkins vulnerability CVSS: 4.3 17 Oct 2014, 15:55 UTC

Cross-site scripting (XSS) vulnerability in Jenkins before 1.551 and LTS before 1.532.2 allows remote attackers to inject arbitrary web script or HTML via the iconSize cookie.

CVE-2014-2064 jenkins vulnerability CVSS: 5.0 17 Oct 2014, 15:55 UTC

The loadUserByUsername function in hudson/security/HudsonPrivateSecurityRealm.java in Jenkins before 1.551 and LTS before 1.532.2 allows remote attackers to determine whether a user exists via vectors related to failed login attempts.

CVE-2014-2063 jenkins vulnerability CVSS: 7.5 17 Oct 2014, 15:55 UTC

Jenkins before 1.551 and LTS before 1.532.2 allows remote attackers to conduct clickjacking attacks via unspecified vectors.

CVE-2014-2062 jenkins vulnerability CVSS: 6.5 17 Oct 2014, 15:55 UTC

Jenkins before 1.551 and LTS before 1.532.2 does not invalidate the API token when a user is deleted, which allows remote authenticated users to retain access via the token.

CVE-2014-2061 jenkins vulnerability CVSS: 5.0 17 Oct 2014, 15:55 UTC

The input control in PasswordParameterDefinition in Jenkins before 1.551 and LTS before 1.532.2 allows remote attackers to obtain passwords by reading the HTML source code, related to the default value.

CVE-2014-2060 jenkins vulnerability CVSS: 5.0 17 Oct 2014, 15:55 UTC

The Winstone servlet container in Jenkins before 1.551 and LTS before 1.532.2 allows remote attackers to hijack sessions via unspecified vectors.

CVE-2014-2058 jenkins vulnerability CVSS: 6.5 17 Oct 2014, 15:55 UTC

BuildTrigger in Jenkins before 1.551 and LTS before 1.532.2 allows remote authenticated users to bypass access restrictions and execute arbitrary jobs by configuring a job to trigger another job. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7330.

CVE-2013-7330 jenkins vulnerability CVSS: 4.0 17 Oct 2014, 15:55 UTC

Jenkins before 1.502 allows remote authenticated users to configure an otherwise restricted project via vectors related to post-build actions.

CVE-2014-3680 jenkins vulnerability CVSS: 4.0 16 Oct 2014, 19:55 UTC

Jenkins before 1.583 and LTS before 1.565.3 allows remote authenticated users with the Job/READ permission to obtain the default value for the password field of a parameterized job by reading the DOM.

CVE-2014-3667 jenkins vulnerability CVSS: 4.0 16 Oct 2014, 19:55 UTC

Jenkins before 1.583 and LTS before 1.565.3 does not properly prevent downloading of plugins, which allows remote authenticated users with the Overall/READ permission to obtain sensitive information by reading the plugin code.

CVE-2014-3666 jenkins vulnerability CVSS: 7.5 16 Oct 2014, 19:55 UTC

Jenkins before 1.583 and LTS before 1.565.3 allows remote attackers to execute arbitrary code via a crafted packet to the CLI channel.

CVE-2014-3663 jenkins vulnerability CVSS: 6.0 16 Oct 2014, 19:55 UTC

Jenkins before 1.583 and LTS before 1.565.3 allows remote authenticated users with the Job/CONFIGURE permission to bypass intended restrictions and create or destroy arbitrary jobs via unspecified vectors.

CVE-2014-3662 jenkins vulnerability CVSS: 5.0 16 Oct 2014, 19:55 UTC

Jenkins before 1.583 and LTS before 1.565.3 allows remote attackers to enumerate user names via vectors related to login attempts.

CVE-2014-3661 jenkins vulnerability CVSS: 5.0 16 Oct 2014, 19:55 UTC

Jenkins before 1.583 and LTS before 1.565.3 allows remote attackers to cause a denial of service (thread consumption) via vectors related to a CLI handshake.

CVE-2014-3681 jenkins vulnerability CVSS: 4.3 15 Oct 2014, 14:55 UTC

Cross-site scripting (XSS) vulnerability in Jenkins before 1.583 and LTS before 1.565.3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

CVE-2014-3664 jenkins vulnerability CVSS: 4.0 15 Oct 2014, 14:55 UTC

Directory traversal vulnerability in Jenkins before 1.583 and LTS before 1.565.3 allows remote authenticated users with the Overall/READ permission to read arbitrary files via unspecified vectors.

CVE-2013-2033 jenkins vulnerability CVSS: 2.1 10 Apr 2014, 20:29 UTC

Cross-site scripting (XSS) vulnerability in Jenkins before 1.514, LTS before 1.509.1, and Enterprise 1.466.x before 1.466.14.1 and 1.480.x before 1.480.4.1 allows remote authenticated users with write permission to inject arbitrary web script or HTML via unspecified vectors.

CVE-2014-2067 jenkins vulnerability CVSS: 3.5 01 Mar 2014, 00:01 UTC

Cross-site scripting (XSS) vulnerability in java/hudson/model/Cause.java in Jenkins before 1.551 and LTS before 1.532.2 allows remote authenticated users to inject arbitrary web script or HTML via a "remote cause note."

CVE-2014-2059 jenkins vulnerability CVSS: 6.5 01 Mar 2014, 00:01 UTC

Directory traversal vulnerability in the CLI job creation (hudson/cli/CreateJobCommand.java) in Jenkins before 1.551 and LTS before 1.532.2 allows remote authenticated users to overwrite arbitrary files via the job name.

CVE-2013-5573 jenkins vulnerability CVSS: 4.3 31 Dec 2013, 16:04 UTC

Cross-site scripting (XSS) vulnerability in the default markup formatter in Jenkins 1.523 allows remote attackers to inject arbitrary web script or HTML via the Description field in the user configuration.

CVE-2013-0331 jenkins vulnerability CVSS: 4.0 19 Mar 2013, 14:55 UTC

Jenkins before 1.502 and LTS before 1.480.3 allows remote authenticated users with write access to cause a denial of service via a crafted payload.

CVE-2013-0330 jenkins vulnerability CVSS: 4.0 19 Mar 2013, 14:55 UTC

Unspecified vulnerability in Jenkins before 1.502 and LTS before 1.480.3 allows remote authenticated users with write access to build arbitrary jobs via unknown attack vectors.

CVE-2013-0329 jenkins vulnerability CVSS: 7.5 19 Mar 2013, 14:55 UTC

Unspecified vulnerability in Jenkins before 1.502 and LTS before 1.480.3 allows remote attackers to bypass the CSRF protection mechanism via unknown attack vectors.

CVE-2013-0328 jenkins vulnerability CVSS: 4.3 19 Mar 2013, 14:55 UTC

Cross-site scripting (XSS) vulnerability in Jenkins before 1.502 and LTS before 1.480.3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

CVE-2013-0327 jenkins vulnerability CVSS: 6.8 19 Mar 2013, 14:55 UTC

Cross-site request forgery (CSRF) vulnerability in Jenkins master in Jenkins before 1.502 and LTS before 1.480.3 allows remote attackers to hijack the authentication of users via unknown vectors.

CVE-2013-0158 jenkins vulnerability CVSS: 2.6 24 Feb 2013, 22:55 UTC

Unspecified vulnerability in Jenkins before 1.498, Jenkins LTS before 1.480.2, and Jenkins Enterprise 1.447.x before 1.447.6.1 and 1.466.x before 1.466.12.1, when a slave is attached and anonymous read access is enabled, allows remote attackers to obtain the master cryptographic key via unknown vectors.

CVE-2012-6074 jenkins vulnerability CVSS: 3.5 24 Feb 2013, 22:55 UTC

Cross-site scripting (XSS) vulnerability in Jenkins before 1.491, Jenkins LTS before 1.480.1, and Jenkins Enterprise 1.424.x before 1.424.6.13, 1.447.x before 1.447.4.1, and 1.466.x before 1.466.10.1 allows remote authenticated users with write access to inject arbitrary web script or HTML via unspecified vectors.

CVE-2012-6073 jenkins vulnerability CVSS: 5.8 24 Feb 2013, 22:55 UTC

Open redirect vulnerability in Jenkins before 1.491, Jenkins LTS before 1.480.1, and Jenkins Enterprise 1.424.x before 1.424.6.13, 1.447.x before 1.447.4.1, and 1.466.x before 1.466.10.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.

CVE-2012-6072 jenkins vulnerability CVSS: 4.3 24 Feb 2013, 22:55 UTC

CRLF injection vulnerability in Jenkins before 1.491, Jenkins LTS before 1.480.1, and Jenkins Enterprise 1.424.x before 1.424.6.13, 1.447.x before 1.447.4.1, and 1.466.x before 1.466.10.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.

CVE-2012-0325 jenkins vulnerability CVSS: 4.3 09 Mar 2012, 11:55 UTC

Cross-site scripting (XSS) vulnerability in Jenkins before 1.454, Jenkins LTS before 1.424.5, and Jenkins Enterprise 1.400.x before 1.400.0.13 and 1.424.x before 1.424.5.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2012-0324.

CVE-2012-0324 jenkins vulnerability CVSS: 4.3 09 Mar 2012, 11:55 UTC

Cross-site scripting (XSS) vulnerability in Jenkins before 1.454, Jenkins LTS before 1.424.5, and Jenkins Enterprise 1.400.x before 1.400.0.13 and 1.424.x before 1.424.5.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2012-0325.

CVE-2011-4344 jenkins vulnerability CVSS: 2.6 01 Dec 2011, 11:55 UTC

Cross-site scripting (XSS) vulnerability in Jenkins Core in Jenkins before 1.438, and 1.409 LTS before 1.409.3 LTS, when a stand-alone container is used, allows remote attackers to inject arbitrary web script or HTML via vectors related to error messages.