Jenkins

Continuous Integration With Toad Edge

4 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 31.6%
  • Published 29.03.2022 13:15:08
  • Last modified 21.11.2024 06:56:50

Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier does not apply Content-Security-Policy headers to report files it serves, resulting in a stored cross-site scripting (XSS) exploitable by attackers with Item/Configure permission or...

  • EPSS 0.62%
  • Published 29.03.2022 13:15:08
  • Last modified 21.11.2024 06:56:50

Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier allows attackers with Item/Configure permission to read arbitrary files on the Jenkins controller by specifying an input folder on the Jenkins controller as a parameter to its build...

  • EPSS 0.9%
  • Published 29.03.2022 13:15:08
  • Last modified 21.11.2024 06:56:50

A missing permission check in Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier allows attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.

  • EPSS 0.26%
  • Published 29.03.2022 13:15:08
  • Last modified 21.11.2024 06:56:50

The file browser in Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier may interpret some paths to files as absolute on Windows, resulting in a path traversal vulnerability allowing attackers with Item/Read permission to obtain the ...