CVE-2023-43495
- EPSS 0.64%
- Veröffentlicht 20.09.2023 17:15:11
- Zuletzt bearbeitet 21.11.2024 08:24:09
Jenkins 2.423 and earlier, LTS 2.414.1 and earlier does not escape the value of the 'caption' constructor parameter of 'ExpandableDetailsNote', resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control th...
CVE-2023-43496
- EPSS 0.18%
- Veröffentlicht 20.09.2023 17:15:11
- Zuletzt bearbeitet 02.05.2025 16:15:22
Jenkins 2.423 and earlier, LTS 2.414.1 and earlier creates a temporary file in the system temporary directory with the default permissions for newly created files when installing a plugin from a URL, potentially allowing attackers with access to the ...
CVE-2023-43497
- EPSS 0.07%
- Veröffentlicht 20.09.2023 17:15:11
- Zuletzt bearbeitet 21.11.2024 08:24:09
In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file uploads using the Stapler web framework creates temporary files in the default system temporary directory with the default permissions for newly created files, potentially allowin...
CVE-2023-43498
- EPSS 0.1%
- Veröffentlicht 20.09.2023 17:15:11
- Zuletzt bearbeitet 21.11.2024 08:24:09
In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file uploads using MultipartFormDataParser creates temporary files in the default system temporary directory with the default permissions for newly created files, potentially allowing ...
CVE-2023-39151
- EPSS 0.87%
- Veröffentlicht 26.07.2023 14:15:10
- Zuletzt bearbeitet 21.11.2024 08:14:48
Jenkins 2.415 and earlier, LTS 2.401.2 and earlier does not sanitize or properly encode URLs in build logs when transforming them into hyperlinks, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control...
- EPSS 0.09%
- Veröffentlicht 14.06.2023 13:15:11
- Zuletzt bearbeitet 02.01.2025 20:16:03
In Jenkins 2.399 and earlier, LTS 2.387.3 and earlier, POST requests are sent in order to load the list of context actions. If part of the URL includes insufficiently escaped user-provided values, a victim may be tricked into sending a POST request t...
CVE-2023-27898
- EPSS 1.13%
- Veröffentlicht 10.03.2023 21:15:15
- Zuletzt bearbeitet 28.02.2025 19:15:34
Jenkins 2.270 through 2.393 (both inclusive), LTS 2.277.1 through 2.375.3 (both inclusive) does not escape the Jenkins version a plugin depends on when rendering the error message stating its incompatibility with the current version of Jenkins, resul...
- EPSS 0.03%
- Veröffentlicht 10.03.2023 21:15:15
- Zuletzt bearbeitet 28.02.2025 19:15:35
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier creates a temporary file in the default temporary directory with the default permissions for newly created files when uploading a plugin for installation, potentially allowing attackers with access t...
CVE-2023-27900
- EPSS 0.1%
- Veröffentlicht 10.03.2023 21:15:15
- Zuletzt bearbeitet 28.02.2025 19:15:35
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier uses the Apache Commons FileUpload library without specifying limits for the number of request parts introduced in version 1.5 for CVE-2023-24998 in hudson.util.MultipartFormDataParser, allowing atta...
CVE-2023-27901
- EPSS 0.1%
- Veröffentlicht 10.03.2023 21:15:15
- Zuletzt bearbeitet 28.02.2025 19:15:35
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier uses the Apache Commons FileUpload library without specifying limits for the number of request parts introduced in version 1.5 for CVE-2023-24998 in org.kohsuke.stapler.RequestImpl, allowing attacker...