- EPSS 0.09%
- Veröffentlicht 14.06.2023 13:15:11
- Zuletzt bearbeitet 02.01.2025 20:16:03
In Jenkins 2.399 and earlier, LTS 2.387.3 and earlier, POST requests are sent in order to load the list of context actions. If part of the URL includes insufficiently escaped user-provided values, a victim may be tricked into sending a POST request t...
CVE-2023-27898
- EPSS 1.98%
- Veröffentlicht 10.03.2023 21:15:15
- Zuletzt bearbeitet 28.02.2025 19:15:34
Jenkins 2.270 through 2.393 (both inclusive), LTS 2.277.1 through 2.375.3 (both inclusive) does not escape the Jenkins version a plugin depends on when rendering the error message stating its incompatibility with the current version of Jenkins, resul...
- EPSS 0.02%
- Veröffentlicht 10.03.2023 21:15:15
- Zuletzt bearbeitet 28.02.2025 19:15:35
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier creates a temporary file in the default temporary directory with the default permissions for newly created files when uploading a plugin for installation, potentially allowing attackers with access t...
CVE-2023-27900
- EPSS 0.4%
- Veröffentlicht 10.03.2023 21:15:15
- Zuletzt bearbeitet 28.02.2025 19:15:35
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier uses the Apache Commons FileUpload library without specifying limits for the number of request parts introduced in version 1.5 for CVE-2023-24998 in hudson.util.MultipartFormDataParser, allowing atta...
CVE-2023-27901
- EPSS 0.4%
- Veröffentlicht 10.03.2023 21:15:15
- Zuletzt bearbeitet 28.02.2025 19:15:35
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier uses the Apache Commons FileUpload library without specifying limits for the number of request parts introduced in version 1.5 for CVE-2023-24998 in org.kohsuke.stapler.RequestImpl, allowing attacker...
CVE-2023-27902
- EPSS 0.5%
- Veröffentlicht 10.03.2023 21:15:15
- Zuletzt bearbeitet 28.02.2025 19:15:35
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier shows temporary directories related to job workspaces, which allows attackers with Item/Workspace permission to access their contents.
CVE-2023-27903
- EPSS 0.06%
- Veröffentlicht 10.03.2023 21:15:15
- Zuletzt bearbeitet 28.02.2025 19:15:35
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier creates a temporary file in the default temporary directory with the default permissions for newly created files when uploading a file parameter through the CLI, potentially allowing attackers with a...
CVE-2023-27904
- EPSS 0.37%
- Veröffentlicht 10.03.2023 21:15:15
- Zuletzt bearbeitet 28.02.2025 19:15:35
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier prints an error stack trace on agent-related pages when agent connections are broken, potentially revealing information about Jenkins configuration that is otherwise inaccessible to attackers.
CVE-2022-41224
- EPSS 3.36%
- Veröffentlicht 21.09.2022 16:15:09
- Zuletzt bearbeitet 28.05.2025 16:15:28
Jenkins 2.367 through 2.369 (both inclusive) does not escape tooltips of the l:helpIcon UI component used for some help icons on the Jenkins web UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to contr...
CVE-2022-2048
- EPSS 1.29%
- Veröffentlicht 07.07.2022 21:15:10
- Zuletzt bearbeitet 21.11.2024 07:00:13
In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service s...