Total
233 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2014-3680 | 2 Jenkins, Redhat | 2 Jenkins, Openshift | 2023-02-12 | 4.0 MEDIUM | N/A |
Jenkins before 1.583 and LTS before 1.565.3 allows remote authenticated users with the Job/READ permission to obtain the default value for the password field of a parameterized job by reading the DOM. | |||||
CVE-2014-3661 | 2 Jenkins, Redhat | 2 Jenkins, Openshift | 2023-02-12 | 5.0 MEDIUM | N/A |
Jenkins before 1.583 and LTS before 1.565.3 allows remote attackers to cause a denial of service (thread consumption) via vectors related to a CLI handshake. | |||||
CVE-2014-3664 | 2 Jenkins, Redhat | 2 Jenkins, Openshift | 2023-02-12 | 4.0 MEDIUM | N/A |
Directory traversal vulnerability in Jenkins before 1.583 and LTS before 1.565.3 allows remote authenticated users with the Overall/READ permission to read arbitrary files via unspecified vectors. | |||||
CVE-2014-3681 | 2 Jenkins, Redhat | 2 Jenkins, Openshift | 2023-02-12 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in Jenkins before 1.583 and LTS before 1.565.3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | |||||
CVE-2014-3667 | 2 Jenkins, Redhat | 2 Jenkins, Openshift | 2023-02-12 | 4.0 MEDIUM | N/A |
Jenkins before 1.583 and LTS before 1.565.3 does not properly prevent downloading of plugins, which allows remote authenticated users with the Overall/READ permission to obtain sensitive information by reading the plugin code. | |||||
CVE-2022-43428 | 1 Jenkins | 2 Compuware Topaz For Total Test, Jenkins | 2023-01-31 | N/A | 5.3 MEDIUM |
Jenkins Compuware Topaz for Total Test Plugin 2.4.8 and earlier implements an agent/controller message that does not limit where it can be executed, allowing attackers able to control agent processes to obtain the values of Java system properties from the Jenkins controller process. | |||||
CVE-2019-10401 | 1 Jenkins | 1 Jenkins | 2023-01-27 | 3.5 LOW | 5.4 MEDIUM |
In Jenkins 2.196 and earlier, LTS 2.176.3 and earlier, the f:expandableTextBox form control interpreted its content as HTML when expanded, resulting in a stored XSS vulnerability exploitable by users with permission to define its contents (typically Job/Configure). | |||||
CVE-2021-21693 | 1 Jenkins | 1 Jenkins | 2022-12-07 | 7.5 HIGH | 9.8 CRITICAL |
When creating temporary files, agent-to-controller access to create those files is only checked after they've been created in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier. | |||||
CVE-2017-2599 | 1 Jenkins | 1 Jenkins | 2022-11-30 | 5.5 MEDIUM | 5.4 MEDIUM |
Jenkins before versions 2.44 and 2.32.2 is vulnerable to an insufficient permission check. This allows users with permissions to create new items (e.g. jobs) to overwrite existing items they don't have access to (SECURITY-321). | |||||
CVE-2022-27201 | 1 Jenkins | 2 Jenkins, Semantic Versioning | 2022-11-29 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Semantic Versioning Plugin 1.13 and earlier does not restrict execution of an controller/agent message to agents, and implements no limitations about the file path that can be parsed, allowing attackers able to control agent processes to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery. | |||||
CVE-2022-34171 | 1 Jenkins | 1 Jenkins | 2022-11-04 | 4.3 MEDIUM | 6.1 MEDIUM |
In Jenkins 2.321 through 2.355 (both inclusive) and LTS 2.332.1 through LTS 2.332.3 (both inclusive) the HTML output generated for new symbol-based SVG icons includes the 'title' attribute of 'l:ionicon' (until Jenkins 2.334) and 'alt' attribute of 'l:icon' (since Jenkins 2.335) without further escaping, resulting in a cross-site scripting (XSS) vulnerability. | |||||
CVE-2022-34173 | 1 Jenkins | 1 Jenkins | 2022-11-04 | 4.3 MEDIUM | 6.1 MEDIUM |
In Jenkins 2.340 through 2.355 (both inclusive) the tooltip of the build button in list views supports HTML without escaping the job display name, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. | |||||
CVE-2022-34172 | 1 Jenkins | 1 Jenkins | 2022-11-04 | 4.3 MEDIUM | 6.1 MEDIUM |
In Jenkins 2.340 through 2.355 (both inclusive) symbol-based icons unescape previously escaped values of 'tooltip' parameters, resulting in a cross-site scripting (XSS) vulnerability. | |||||
CVE-2022-34170 | 1 Jenkins | 1 Jenkins | 2022-11-04 | 4.3 MEDIUM | 6.1 MEDIUM |
In Jenkins 2.320 through 2.355 (both inclusive) and LTS 2.332.1 through LTS 2.332.3 (both inclusive) the help icon does not escape the feature name that is part of its tooltip, effectively undoing the fix for SECURITY-1955, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. | |||||
CVE-2022-2048 | 4 Debian, Eclipse, Jenkins and 1 more | 8 Debian Linux, Jetty, Jenkins and 5 more | 2022-10-25 | 5.0 MEDIUM | 7.5 HIGH |
In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests. | |||||
CVE-2021-21605 | 1 Jenkins | 1 Jenkins | 2022-10-24 | 6.0 MEDIUM | 8.0 HIGH |
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows users with Agent/Configure permission to choose agent names that cause Jenkins to override the global `config.xml` file. | |||||
CVE-2021-21695 | 1 Jenkins | 1 Jenkins | 2022-10-24 | 6.8 MEDIUM | 8.8 HIGH |
FilePath#listFiles lists files outside directories that agents are allowed to access when following symbolic links in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier. | |||||
CVE-2021-21689 | 1 Jenkins | 1 Jenkins | 2022-10-24 | 6.4 MEDIUM | 9.1 CRITICAL |
FilePath#unzip and FilePath#untar were not subject to any agent-to-controller access control in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier. | |||||
CVE-2022-43429 | 1 Jenkins | 2 Compuware Topaz For Total Test, Jenkins | 2022-10-21 | N/A | 7.5 HIGH |
Jenkins Compuware Topaz for Total Test Plugin 2.4.8 and earlier implements an agent/controller message that does not limit where it can be executed, allowing attackers able to control agent processes to read arbitrary files on the Jenkins controller file system. | |||||
CVE-2022-43424 | 1 Jenkins | 2 Compuware Xpediter Code, Jenkins | 2022-10-21 | N/A | 5.3 MEDIUM |
Jenkins Compuware Xpediter Code Coverage Plugin 1.0.7 and earlier implements an agent/controller message that does not limit where it can be executed, allowing attackers able to control agent processes to obtain the values of Java system properties from the Jenkins controller process. |