Jenkins

Aws Codecommit Trigger

5 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Published 06.09.2023 13:15:11
  • Last modified 21.11.2024 08:21:57

A missing permission check in Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of AWS credentials stored in Jenkins.

  • EPSS 0.04%
  • Published 06.09.2023 13:15:11
  • Last modified 21.11.2024 08:21:58

A cross-site request forgery (CSRF) vulnerability in Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier allows attackers to clear the SQS queue.

  • EPSS 0.05%
  • Published 06.09.2023 13:15:11
  • Last modified 21.11.2024 08:21:58

Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to clear the SQS queue.

  • EPSS 0.12%
  • Published 06.09.2023 13:15:11
  • Last modified 21.11.2024 08:21:58

Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not escape the queue name parameter passed to a form validation URL, when rendering an error message, resulting in an HTML injection vulnerability.

  • EPSS 0.05%
  • Published 14.06.2023 13:15:12
  • Last modified 31.12.2024 18:15:24

Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not restrict the AWS SQS queue name path parameter in an HTTP endpoint, allowing attackers with Item/Read permission to obtain the contents of arbitrary files on the Jenkins controller fil...