Jenkins

Jenkins

251 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.54%
  • Veröffentlicht 25.09.2019 16:15:10
  • Zuletzt bearbeitet 21.11.2024 04:19:03

In Jenkins 2.196 and earlier, LTS 2.176.3 and earlier, the f:combobox form control interpreted its item labels as HTML, resulting in a stored XSS vulnerability exploitable by users with permission to define its contents.

  • EPSS 0.54%
  • Veröffentlicht 25.09.2019 16:15:10
  • Zuletzt bearbeitet 21.11.2024 04:19:03

Jenkins 2.196 and earlier, LTS 2.176.3 and earlier did not escape the SCM tag name on the tooltip for SCM tag actions, resulting in a stored XSS vulnerability exploitable by users able to control SCM tag names for these actions.

  • EPSS 0.54%
  • Veröffentlicht 25.09.2019 16:15:10
  • Zuletzt bearbeitet 21.11.2024 04:19:03

Jenkins 2.196 and earlier, LTS 2.176.3 and earlier did not escape the reason why a queue items is blcoked in tooltips, resulting in a stored XSS vulnerability exploitable by users able to control parts of the reason a queue item is blocked, such as l...

  • EPSS 79.43%
  • Veröffentlicht 25.09.2019 16:15:10
  • Zuletzt bearbeitet 21.11.2024 04:19:03

Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value of the "Cookie" HTTP request header on the /whoAmI/ URL, allowing attackers exploiting another XSS vulnerability to obtain the HTTP session cookie despite it being marked HttpOnly.

  • EPSS 0.56%
  • Veröffentlicht 25.09.2019 16:15:10
  • Zuletzt bearbeitet 21.11.2024 04:19:04

Jenkins 2.196 and earlier, LTS 2.176.3 and earlier did not restrict or filter values set as Jenkins URL in the global configuration, resulting in a stored XSS vulnerability exploitable by attackers with Overall/Administer permission.

  • EPSS 0.64%
  • Veröffentlicht 28.08.2019 16:15:10
  • Zuletzt bearbeitet 21.11.2024 04:19:00

A stored cross-site scripting vulnerability in Jenkins 2.191 and earlier, LTS 2.176.2 and earlier allowed attackers with Overall/Administer permission to configure the update site URL to inject arbitrary HTML and JavaScript in update center web pages...

  • EPSS 0.14%
  • Veröffentlicht 28.08.2019 16:15:10
  • Zuletzt bearbeitet 21.11.2024 04:19:01

Jenkins 2.191 and earlier, LTS 2.176.2 and earlier allowed users to obtain CSRF tokens without an associated web session ID, resulting in CSRF tokens that did not expire and could be used to bypass CSRF protection for the anonymous user.

Exploit
  • EPSS 40.37%
  • Veröffentlicht 17.07.2019 16:15:12
  • Zuletzt bearbeitet 21.11.2024 04:18:57

A path traversal vulnerability in Jenkins 2.185 and earlier, LTS 2.176.1 and earlier in core/src/main/java/hudson/model/FileParameterValue.java allowed attackers with Job/Configure permission to define a file parameter with a file name outside the in...

  • EPSS 0.17%
  • Veröffentlicht 17.07.2019 16:15:12
  • Zuletzt bearbeitet 21.11.2024 04:18:57

CSRF tokens in Jenkins 2.185 and earlier, LTS 2.176.1 and earlier did not expire, thereby allowing attackers able to obtain them to bypass CSRF protection.

  • EPSS 0.2%
  • Veröffentlicht 17.07.2019 16:15:12
  • Zuletzt bearbeitet 21.11.2024 04:18:57

A vulnerability in the Stapler web framework used in Jenkins 2.185 and earlier, LTS 2.176.1 and earlier allowed attackers to access view fragments directly, bypassing permission checks and possibly obtain sensitive information.