Jenkins

Jenkins

251 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.38%
  • Veröffentlicht 13.01.2021 16:15:13
  • Zuletzt bearbeitet 21.11.2024 05:48:41

Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows users with Agent/Configure permission to choose agent names that cause Jenkins to override the global `config.xml` file.

  • EPSS 0.24%
  • Veröffentlicht 13.01.2021 16:15:13
  • Zuletzt bearbeitet 21.11.2024 05:48:41

Jenkins 2.274 and earlier, LTS 2.263.1 and earlier improperly validates the format of a provided fingerprint ID when checking for its existence allowing an attacker to check for the existence of XML files with a short path.

  • EPSS 0.33%
  • Veröffentlicht 13.01.2021 16:15:13
  • Zuletzt bearbeitet 21.11.2024 05:48:41

Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not limit sizes provided as query parameters to graph-rendering URLs, allowing attackers to request crafted URLs that use all available memory in Jenkins, potentially leading to out of memory er...

  • EPSS 0.54%
  • Veröffentlicht 13.01.2021 16:15:13
  • Zuletzt bearbeitet 21.11.2024 05:48:41

Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape button labels in the Jenkins UI, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers with the ability to control button labels.

  • EPSS 0.15%
  • Veröffentlicht 13.01.2021 16:15:13
  • Zuletzt bearbeitet 21.11.2024 05:48:41

Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not correctly match requested URLs to the list of always accessible paths, allowing attackers without Overall/Read permission to access some URLs as if they did have Overall/Read permission.

  • EPSS 0.04%
  • Veröffentlicht 01.09.2020 14:15:13
  • Zuletzt bearbeitet 21.11.2024 05:25:05

Jenkins SoapUI Pro Functional Testing Plugin 1.5 and earlier transmits project passwords in its configuration in plain text as part of job configuration forms, potentially resulting in their exposure.

Exploit
  • EPSS 2.23%
  • Veröffentlicht 12.08.2020 14:15:13
  • Zuletzt bearbeitet 21.11.2024 05:25:01

Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the tooltip content of help icons, resulting in a stored cross-site scripting (XSS) vulnerability.

Exploit
  • EPSS 0.33%
  • Veröffentlicht 12.08.2020 14:15:13
  • Zuletzt bearbeitet 21.11.2024 05:25:01

Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the project naming strategy description, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by users with Overall/Manage permission.

Exploit
  • EPSS 0.67%
  • Veröffentlicht 12.08.2020 14:15:13
  • Zuletzt bearbeitet 21.11.2024 05:25:01

Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the remote address of the host starting a build via 'Trigger builds remotely', resulting in a stored cross-site scripting (XSS) vulnerability exploitable by users with Job/Configure p...

  • EPSS 0.58%
  • Veröffentlicht 15.07.2020 18:15:37
  • Zuletzt bearbeitet 21.11.2024 05:24:59

Jenkins 2.244 and earlier, LTS 2.235.1 and earlier does not escape the upstream job's display name shown as part of a build cause, resulting in a stored cross-site scripting vulnerability.