Jenkins

Gogs

4 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Published 25.10.2023 18:17:40
  • Last modified 21.11.2024 08:28:59

Jenkins Gogs Plugin 1.0.15 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token.

  • EPSS 0.14%
  • Published 16.08.2023 15:15:12
  • Last modified 21.11.2024 08:19:16

The webhook endpoint in Jenkins Gogs Plugin 1.0.15 and earlier provides unauthenticated attackers information about the existence of jobs in its output.

  • EPSS 0.12%
  • Published 16.08.2023 15:15:12
  • Last modified 21.11.2024 08:19:16

Jenkins Gogs Plugin 1.0.15 and earlier improperly initializes an option to secure its webhook endpoint, allowing unauthenticated attackers to trigger builds of jobs.

  • EPSS 0.09%
  • Published 11.07.2019 14:15:10
  • Last modified 21.11.2024 04:18:56

Jenkins Gogs Plugin stored credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.