Jenkins

Fortify

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.23%
  • Veröffentlicht 21.08.2023 23:15:09
  • Zuletzt bearbeitet 21.11.2024 08:34:49

A cross-site request forgery (CSRF) vulnerability in Jenkins Fortify Plugin 22.1.38 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials s...

  • EPSS 0.18%
  • Veröffentlicht 21.08.2023 23:15:09
  • Zuletzt bearbeitet 21.11.2024 08:34:49

A missing permission check in Jenkins Fortify Plugin 22.1.38 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credent...

  • EPSS 0.21%
  • Veröffentlicht 21.08.2023 23:15:09
  • Zuletzt bearbeitet 21.11.2024 08:34:49

Jenkins Fortify Plugin 22.1.38 and earlier does not escape the error message for a form validation method, resulting in an HTML injection vulnerability.

  • EPSS 0.31%
  • Veröffentlicht 15.02.2022 17:15:09
  • Zuletzt bearbeitet 21.11.2024 06:51:46

Jenkins Fortify Plugin 20.2.34 and earlier does not sanitize the appName and appVersion parameters of its Pipeline steps, allowing attackers with Item/Configure permission to write or overwrite .xml files on the Jenkins controller file system with co...

  • EPSS 0.03%
  • Veröffentlicht 29.01.2020 16:15:12
  • Zuletzt bearbeitet 21.11.2024 05:24:39

Jenkins Fortify Plugin 19.1.29 and earlier stores proxy server passwords unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.