Jenkins

Jenkins

256 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 5.05%
  • Veröffentlicht 23.06.2022 17:15:15
  • Zuletzt bearbeitet 21.11.2024 07:08:59

In Jenkins 2.320 through 2.355 (both inclusive) and LTS 2.332.1 through LTS 2.332.3 (both inclusive) the help icon does not escape the feature name that is part of its tooltip, effectively undoing the fix for SECURITY-1955, resulting in a cross-site ...

  • EPSS 4.33%
  • Veröffentlicht 23.06.2022 17:15:15
  • Zuletzt bearbeitet 21.11.2024 07:08:59

In Jenkins 2.321 through 2.355 (both inclusive) and LTS 2.332.1 through LTS 2.332.3 (both inclusive) the HTML output generated for new symbol-based SVG icons includes the 'title' attribute of 'l:ionicon' (until Jenkins 2.334) and 'alt' attribute of '...

  • EPSS 6.4%
  • Veröffentlicht 23.06.2022 17:15:15
  • Zuletzt bearbeitet 21.11.2024 07:08:59

In Jenkins 2.340 through 2.355 (both inclusive) symbol-based icons unescape previously escaped values of 'tooltip' parameters, resulting in a cross-site scripting (XSS) vulnerability.

  • EPSS 11.82%
  • Veröffentlicht 23.06.2022 17:15:15
  • Zuletzt bearbeitet 21.11.2024 07:09:00

In Jenkins 2.340 through 2.355 (both inclusive) the tooltip of the build button in list views supports HTML without escaping the job display name, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure per...

  • EPSS 1.93%
  • Veröffentlicht 23.06.2022 17:15:15
  • Zuletzt bearbeitet 21.11.2024 07:09:00

In Jenkins 2.355 and earlier, LTS 2.332.3 and earlier, an observable timing discrepancy on the login form allows distinguishing between login attempts with an invalid username, and login attempts with a valid username and wrong password, when using t...

  • EPSS 4.14%
  • Veröffentlicht 23.06.2022 17:15:15
  • Zuletzt bearbeitet 21.11.2024 07:09:00

Jenkins 2.335 through 2.355 (both inclusive) allows attackers in some cases to bypass a protection mechanism, thereby directly accessing some view fragments containing sensitive information, bypassing any permission checks in the corresponding view.

  • EPSS 2.99%
  • Veröffentlicht 09.02.2022 14:15:07
  • Zuletzt bearbeitet 21.11.2024 06:38:52

Jenkins 2.333 and earlier, LTS 2.319.2 and earlier defines custom XStream converters that have not been updated to apply the protections for the vulnerability CVE-2021-43859 and allow unconstrained resource usage.

Exploit
  • EPSS 2.03%
  • Veröffentlicht 01.02.2022 12:15:08
  • Zuletzt bearbeitet 03.11.2025 22:15:52

XStream is an open source java library to serialize objects to XML and back again. Versions prior to 1.4.19 may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resul...

  • EPSS 0.18%
  • Veröffentlicht 12.01.2022 20:15:08
  • Zuletzt bearbeitet 21.11.2024 06:43:09

A cross-site request forgery (CSRF) vulnerability in Jenkins 2.329 and earlier, LTS 2.319.1 and earlier allows attackers to trigger build of job without parameters when no security realm is set.

  • EPSS 0.28%
  • Veröffentlicht 04.11.2021 17:15:08
  • Zuletzt bearbeitet 21.11.2024 05:48:50

File path filters in the agent-to-controller security subsystem of Jenkins 2.318 and earlier, LTS 2.303.2 and earlier do not canonicalize paths, allowing operations to follow symbolic links to outside allowed directories.