Vulnerabilities (CVE)

Filtered by vendor Jenkins Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-2299 1 Jenkins 1 Active Directory 2020-11-10 7.5 HIGH 9.8 CRITICAL
Jenkins Active Directory Plugin 2.19 and earlier allows attackers to log in as any user if a magic constant is used as the password.
CVE-2020-2301 1 Jenkins 1 Active Directory 2020-11-09 7.5 HIGH 9.8 CRITICAL
Jenkins Active Directory Plugin 2.19 and earlier allows attackers to log in as any user with any password while a successful authentication of that user is still in the optional cache when using Windows/ADSI mode.
CVE-2020-2300 1 Jenkins 1 Active Directory 2020-11-09 7.5 HIGH 9.8 CRITICAL
Jenkins Active Directory Plugin 2.19 and earlier does not prohibit the use of an empty password in Windows/ADSI mode, which allows attackers to log in to Jenkins as any user depending on the configuration of the Active Directory server.
CVE-2020-2307 1 Jenkins 1 Kubernetes 2020-11-09 4.0 MEDIUM 4.3 MEDIUM
Jenkins Kubernetes Plugin 1.27.3 and earlier allows low-privilege users to access possibly sensitive Jenkins controller environment variables.
CVE-2020-2306 1 Jenkins 1 Mercurial 2020-11-06 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins Mercurial Plugin 2.11 and earlier allows attackers with Overall/Read permission to obtain a list of names of configured Mercurial installations.
CVE-2020-2309 1 Jenkins 1 Kubernetes 2020-11-06 4.0 MEDIUM 4.3 MEDIUM
A missing/An incorrect permission check in Jenkins Kubernetes Plugin 1.27.3 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
CVE-2020-2308 1 Jenkins 1 Kubernetes 2020-11-06 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins Kubernetes Plugin 1.27.3 and earlier allows attackers with Overall/Read permission to list global pod template names.
CVE-2020-2303 1 Jenkins 1 Active Directory 2020-11-06 4.3 MEDIUM 4.3 MEDIUM
A cross-site request forgery (CSRF) vulnerability in Jenkins Active Directory Plugin 2.19 and earlier allows attackers to perform connection tests, connecting to attacker-specified or previously configured Active Directory servers using attacker-specified credentials.
CVE-2020-2313 1 Jenkins 1 Azure Key Vault 2020-11-06 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins Azure Key Vault Plugin 2.0 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
CVE-2020-2311 1 Jenkins 1 Aws Global Configuration 2020-11-06 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins AWS Global Configuration Plugin 1.5 and earlier allows attackers with Overall/Read permission to replace the global AWS configuration.
CVE-2020-2302 1 Jenkins 1 Active Directory 2020-11-06 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins Active Directory Plugin 2.19 and earlier allows attackers with Overall/Read permission to access the domain health check diagnostic page.
CVE-2020-2286 1 Jenkins 1 Role-based Authorization Strategy 2020-10-23 6.8 MEDIUM 8.8 HIGH
Jenkins Role-based Authorization Strategy Plugin 3.0 and earlier does not properly invalidate a permission cache when the configuration is changed, resulting in permissions being granted based on an outdated configuration.
CVE-2019-1003030 2 Jenkins, Redhat 2 Pipeline\, Openshift Container Platform 2020-10-19 6.5 MEDIUM 9.9 CRITICAL
A sandbox bypass vulnerability exists in Jenkins Pipeline: Groovy Plugin 2.63 and earlier in pom.xml, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShell.java that allows attackers able to control pipeline scripts to execute arbitrary code on the Jenkins master JVM.
CVE-2020-2298 1 Jenkins 1 Nerrvana 2020-10-16 4.0 MEDIUM 6.5 MEDIUM
Jenkins Nerrvana Plugin 1.02.06 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
CVE-2020-2287 1 Jenkins 1 Audit Trail 2020-10-16 5.0 MEDIUM 5.3 MEDIUM
Jenkins Audit Trail Plugin 3.6 and earlier applies pattern matching to a different representation of request URL paths than the Stapler web framework uses for dispatching requests, which allows attackers to craft URLs that bypass request logging of any target URL.
CVE-2020-2292 1 Jenkins 1 Release 2020-10-15 3.5 LOW 5.4 MEDIUM
Jenkins Release Plugin 2.10.2 and earlier does not escape the release version in badge tooltip, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Release/Release permission.
CVE-2020-2293 1 Jenkins 1 Persona 2020-10-09 4.0 MEDIUM 6.5 MEDIUM
Jenkins Persona Plugin 2.4 and earlier allows users with Overall/Read permission to read arbitrary files on the Jenkins controller.
CVE-2020-2290 1 Jenkins 1 Active Choices 2020-10-09 3.5 LOW 5.4 MEDIUM
Jenkins Active Choices Plugin 2.4 and earlier does not escape some return values of sandboxed scripts for Reactive Reference Parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
CVE-2020-2289 1 Jenkins 1 Active Choices 2020-10-09 3.5 LOW 5.4 MEDIUM
Jenkins Active Choices Plugin 2.4 and earlier does not escape the name and description of build parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
CVE-2020-2288 1 Jenkins 1 Audit Trail 2020-10-09 5.0 MEDIUM 5.3 MEDIUM
In Jenkins Audit Trail Plugin 3.6 and earlier, the default regular expression pattern could be bypassed in many cases by adding a suffix to the URL that would be ignored during request handling.
CVE-2020-2296 1 Jenkins 1 Shared Objects 2020-10-09 4.3 MEDIUM 4.3 MEDIUM
A cross-site request forgery (CSRF) vulnerability in Jenkins Shared Objects Plugin 0.44 and earlier allows attackers to configure shared objects.
CVE-2019-16547 1 Jenkins 1 Google Compute Engine 2020-10-09 4.0 MEDIUM 4.3 MEDIUM
Missing permission checks in various API endpoints in Jenkins Google Compute Engine Plugin 4.1.1 and earlier allow attackers with Overall/Read permission to obtain limited information about the plugin configuration and environment.
CVE-2019-16566 1 Jenkins 1 Team Concert 2020-10-05 4.0 MEDIUM 6.5 MEDIUM
A missing permission check in Jenkins Team Concert Plugin 1.3.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
CVE-2019-16567 1 Jenkins 1 Team Concert 2020-10-05 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins Team Concert Plugin 1.3.0 and earlier in form-related methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins.
CVE-2019-16571 1 Jenkins 1 Rapiddeploy 2020-10-05 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins RapidDeploy Plugin 4.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified web server.
CVE-2019-16574 1 Jenkins 1 Alauda Devops Pipeline 2020-10-05 4.0 MEDIUM 6.5 MEDIUM
A missing permission check in Jenkins Alauda DevOps Pipeline Plugin 2.3.2 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
CVE-2019-16576 1 Jenkins 1 Alauda Kubernetes Support 2020-10-05 4.0 MEDIUM 6.5 MEDIUM
A missing permission check in Jenkins Alauda Kubernetes Suport Plugin 2.3.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing the Kubernetes service account token or credentials stored in Jenkins.
CVE-2019-10277 1 Jenkins 1 Starteam 2020-10-02 4.0 MEDIUM 8.8 HIGH
Jenkins StarTeam Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-10280 1 Jenkins 1 Assembla Auth 2020-10-02 4.0 MEDIUM 8.8 HIGH
Jenkins Assembla Auth Plugin stores credentials unencrypted in the global config.xml configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
CVE-2019-10291 1 Jenkins 1 Netsparker Cloud Scan 2020-10-02 4.0 MEDIUM 8.8 HIGH
Jenkins Netsparker Cloud Scan Plugin 1.1.5 and older stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.
CVE-2019-10290 1 Jenkins 1 Netsparker Cloud Scan 2020-10-02 4.0 MEDIUM 6.5 MEDIUM
A missing permission check in Jenkins Netsparker Cloud Scan Plugin 1.1.5 and older in the NCScanBuilder.DescriptorImpl#doValidateAPI form validation method allowed attackers with Overall/Read permission to initiate a connection to an attacker-specified server.
CVE-2019-10282 1 Jenkins 1 Klaros-testmanagement 2020-10-02 4.0 MEDIUM 8.8 HIGH
Jenkins Klaros-Testmanagement Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-10281 1 Jenkins 1 Relution Enterprise Appstore Publisher 2020-10-02 4.0 MEDIUM 8.8 HIGH
Jenkins Relution Enterprise Appstore Publisher Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
CVE-2019-10298 1 Jenkins 1 Koji 2020-10-02 4.0 MEDIUM 8.8 HIGH
Jenkins Koji Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
CVE-2019-10297 1 Jenkins 1 Sametime 2020-10-02 4.0 MEDIUM 8.8 HIGH
Jenkins Sametime Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
CVE-2019-10296 1 Jenkins 1 Serena Sra Deploy 2020-10-02 4.0 MEDIUM 8.8 HIGH
Jenkins Serena SRA Deploy Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
CVE-2019-10295 1 Jenkins 1 Crittercism-dsym 2020-10-02 4.0 MEDIUM 8.8 HIGH
Jenkins crittercism-dsym Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-10294 1 Jenkins 1 Kmap 2020-10-02 4.0 MEDIUM 8.8 HIGH
Jenkins Kmap Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-10299 1 Jenkins 1 Cloudcoreo Deploytime 2020-10-02 4.0 MEDIUM 8.8 HIGH
Jenkins CloudCoreo DeployTime Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
CVE-2019-10302 1 Jenkins 1 Jira-ext 2020-10-02 4.0 MEDIUM 8.8 HIGH
Jenkins jira-ext Plugin 0.8 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.
CVE-2019-10308 1 Jenkins 1 Static Analysis Utilities 2020-10-02 4.0 MEDIUM 6.5 MEDIUM
A missing permission check in Jenkins Static Analysis Utilities Plugin 1.95 and earlier in the DefaultGraphConfigurationView#doSave form handler method allowed attackers with Overall/Read permission to change the per-job default graph configuration for all users.
CVE-2019-10306 1 Jenkins 1 Ontrack 2020-10-02 6.5 MEDIUM 9.9 CRITICAL
A sandbox bypass vulnerability in Jenkins ontrack Plugin 3.4 and earlier allowed attackers with control over ontrack DSL definitions to execute arbitrary code on the Jenkins master JVM.
CVE-2019-10305 1 Jenkins 1 Xebialabs Xl Deploy 2020-10-02 4.0 MEDIUM 6.5 MEDIUM
A missing permission check in Jenkins XebiaLabs XL Deploy Plugin in the Credential#doValidateUserNamePassword form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.
CVE-2019-10303 1 Jenkins 1 Azure Publishersettings Credentials 2020-10-02 4.0 MEDIUM 8.8 HIGH
Jenkins Azure PublisherSettings Credentials Plugin 1.2 and earlier stored credentials unencrypted in the credentials.xml file on the Jenkins master where they could be viewed by users with access to the master file system.
CVE-2019-10316 1 Jenkins 1 Aqua Microscanner 2020-10-02 4.0 MEDIUM 8.8 HIGH
Jenkins Aqua MicroScanner Plugin 1.0.5 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.
CVE-2019-10318 1 Jenkins 1 Azure Ad 2020-10-02 4.0 MEDIUM 8.8 HIGH
Jenkins Azure AD Plugin 0.3.3 and earlier stored the client secret unencrypted in the global config.xml configuration file on the Jenkins master where it could be viewed by users with access to the master file system.
CVE-2019-10319 1 Jenkins 1 Pluggable Authentication Module 2020-10-02 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins PAM Authentication Plugin 1.5 and earlier, except 1.4.1 in PamSecurityRealm.DescriptorImpl#doTest allowed users with Overall/Read permission to obtain limited information about the file /etc/shadow and the user Jenkins is running as.
CVE-2019-10333 1 Jenkins 1 Electricflow 2020-10-02 4.0 MEDIUM 4.3 MEDIUM
Missing permission checks in Jenkins ElectricFlow Plugin 1.1.5 and earlier in various HTTP endpoints allowed users with Overall/Read access to obtain information about the Jenkins ElectricFlow Plugin configuration and configuration of connected ElectricFlow instances.
CVE-2019-10350 1 Jenkins 1 Port Allocator 2020-10-02 4.0 MEDIUM 8.8 HIGH
Jenkins Port Allocator Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
CVE-2019-10347 1 Jenkins 1 Mashup Portlets 2020-10-02 4.0 MEDIUM 8.8 HIGH
Jenkins Mashup Portlets Plugin stored credentials unencrypted on the Jenkins master where they can be viewed by users with access to the master file system.