Vulnerabilities (CVE)

Filtered by vendor Jenkins Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-20618 1 Jenkins 1 Bitbucket Branch Source 2023-11-30 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins Bitbucket Branch Source Plugin 737.vdf9dc06105be and earlier allows attackers with Overall/Read access to enumerate credentials IDs of credentials stored in Jenkins.
CVE-2022-23112 1 Jenkins 1 Publish Over Ssh 2023-11-30 4.0 MEDIUM 6.5 MEDIUM
A missing permission check in Jenkins Publish Over SSH Plugin 1.22 and earlier allows attackers with Overall/Read access to connect to an attacker-specified SSH server using attacker-specified credentials.
CVE-2022-27205 1 Jenkins 1 Extended Choice Parameter 2023-11-30 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL.
CVE-2022-23115 1 Jenkins 1 Batch Task 2023-11-30 5.8 MEDIUM 5.4 MEDIUM
Cross-site request forgery (CSRF) vulnerabilities in Jenkins batch task Plugin 1.19 and earlier allows attackers with Overall/Read access to retrieve logs, build or delete a batch task.
CVE-2022-25189 1 Jenkins 1 Custom Checkbox Parameter 2023-11-30 3.5 LOW 5.4 MEDIUM
Jenkins Custom Checkbox Parameter Plugin 1.1 and earlier does not escape parameter names of custom checkbox parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
CVE-2022-23114 1 Jenkins 1 Publish Over Ssh 2023-11-30 2.1 LOW 3.3 LOW
Jenkins Publish Over SSH Plugin 1.22 and earlier stores password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
CVE-2022-23113 1 Jenkins 1 Publish Over Ssh 2023-11-30 4.0 MEDIUM 4.3 MEDIUM
Jenkins Publish Over SSH Plugin 1.22 and earlier performs a validation of the file name specifying whether it is present or not, resulting in a path traversal vulnerability allowing attackers with Item/Configure permission to discover the name of the Jenkins controller files.
CVE-2022-23111 1 Jenkins 1 Publish Over Ssh 2023-11-30 4.3 MEDIUM 4.3 MEDIUM
A cross-site request forgery (CSRF) vulnerability in Jenkins Publish Over SSH Plugin 1.22 and earlier allows attackers to connect to an attacker-specified SSH server using attacker-specified credentials.
CVE-2022-25187 1 Jenkins 1 Support Core 2023-11-30 4.0 MEDIUM 6.5 MEDIUM
Jenkins Support Core Plugin 2.79 and earlier does not redact some sensitive information in the support bundle.
CVE-2022-20621 1 Jenkins 1 Metrics 2023-11-30 2.1 LOW 5.5 MEDIUM
Jenkins Metrics Plugin 4.0.2.8 and earlier stores an access key unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
CVE-2022-25188 1 Jenkins 1 Fortify 2023-11-30 4.0 MEDIUM 4.3 MEDIUM
Jenkins Fortify Plugin 20.2.34 and earlier does not sanitize the appName and appVersion parameters of its Pipeline steps, allowing attackers with Item/Configure permission to write or overwrite .xml files on the Jenkins controller file system with content not controllable by the attacker.
CVE-2022-27199 1 Jenkins 1 Cloudbees Aws Credentials 2023-11-22 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins CloudBees AWS Credentials Plugin 189.v3551d5642995 and earlier allows attackers with Overall/Read permission to connect to an AWS service using an attacker-specified token.
CVE-2021-21688 1 Jenkins 1 Jenkins 2023-11-22 5.0 MEDIUM 7.5 HIGH
The agent-to-controller security check FilePath#reading(FileVisitor) in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not reject any operations, allowing users to have unrestricted read access using certain operations (creating archives, FilePath#copyRecursiveTo).
CVE-2021-43576 1 Jenkins 1 Pom2config 2023-11-22 4.3 MEDIUM 6.5 MEDIUM
Jenkins pom2config Plugin 1.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks, allowing attackers with Overall/Read and Item/Read permissions to have Jenkins parse a crafted XML file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
CVE-2021-21689 1 Jenkins 1 Jenkins 2023-11-22 6.4 MEDIUM 9.1 CRITICAL
FilePath#unzip and FilePath#untar were not subject to any agent-to-controller access control in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
CVE-2022-27200 1 Jenkins 1 Folder-based Authorization Strategy 2023-11-22 3.5 LOW 4.8 MEDIUM
Jenkins Folder-based Authorization Strategy Plugin 1.3 and earlier does not escape the names of roles shown on the configuration form, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission.
CVE-2022-20613 2 Jenkins, Oracle 2 Mailer, Communications Cloud Native Core Automated Test Suite 2023-11-22 4.3 MEDIUM 4.3 MEDIUM
A cross-site request forgery (CSRF) vulnerability in Jenkins Mailer Plugin 391.ve4a_38c1b_cf4b_ and earlier allows attackers to use the DNS used by the Jenkins instance to resolve an attacker-specified hostname.
CVE-2021-43578 1 Jenkins 1 Squash Tm Publisher 2023-11-22 5.5 MEDIUM 8.1 HIGH
Jenkins Squash TM Publisher (Squash4Jenkins) Plugin 1.0.0 and earlier implements an agent-to-controller message that does not implement any validation of its input, allowing attackers able to control agent processes to replace arbitrary files on the Jenkins controller file system with an attacker-controlled JSON string.
CVE-2022-20612 2 Jenkins, Oracle 2 Jenkins, Communications Cloud Native Core Automated Test Suite 2023-11-22 2.6 LOW 4.3 MEDIUM
A cross-site request forgery (CSRF) vulnerability in Jenkins 2.329 and earlier, LTS 2.319.1 and earlier allows attackers to trigger build of job without parameters when no security realm is set.
CVE-2022-27201 1 Jenkins 2 Jenkins, Semantic Versioning 2023-11-22 4.0 MEDIUM 6.5 MEDIUM
Jenkins Semantic Versioning Plugin 1.13 and earlier does not restrict execution of an controller/agent message to agents, and implements no limitations about the file path that can be parsed, allowing attackers able to control agent processes to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
CVE-2021-43577 1 Jenkins 1 Owasp Dependency-check 2023-11-22 5.5 MEDIUM 7.1 HIGH
Jenkins OWASP Dependency-Check Plugin 5.1.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
CVE-2022-20616 1 Jenkins 1 Credentials Binding 2023-11-22 4.0 MEDIUM 4.3 MEDIUM
Jenkins Credentials Binding Plugin 1.27 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read access to validate if a credential ID refers to a secret file credential and whether it's a zip file.
CVE-2022-27202 1 Jenkins 1 Extended Choice Parameter 2023-11-22 3.5 LOW 5.4 MEDIUM
Jenkins Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier does not escape the value and description of extended choice parameters of radio buttons or check boxes type, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
CVE-2022-20614 2 Jenkins, Oracle 2 Mailer, Communications Cloud Native Core Automated Test Suite 2023-11-22 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins Mailer Plugin 391.ve4a_38c1b_cf4b_ and earlier allows attackers with Overall/Read access to use the DNS used by the Jenkins instance to resolve an attacker-specified hostname.
CVE-2022-20615 2 Jenkins, Oracle 2 Matrix Project, Communications Cloud Native Core Automated Test Suite 2023-11-22 3.5 LOW 5.4 MEDIUM
Jenkins Matrix Project Plugin 1.19 and earlier does not escape HTML metacharacters in node and label names, and label descriptions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Agent/Configure permission.
CVE-2022-20617 1 Jenkins 1 Docker Commons 2023-11-22 6.5 MEDIUM 8.8 HIGH
Jenkins Docker Commons Plugin 1.17 and earlier does not sanitize the name of an image or a tag, resulting in an OS command execution vulnerability exploitable by attackers with Item/Configure permission or able to control the contents of a previously configured job's SCM repository.
CVE-2021-21700 1 Jenkins 1 Scriptler 2023-11-22 3.5 LOW 5.4 MEDIUM
Jenkins Scriptler Plugin 3.3 and earlier does not escape the name of scripts on the UI when asking to confirm their deletion, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by exploitable by attackers able to create Scriptler scripts.
CVE-2021-21701 1 Jenkins 1 Performance 2023-11-22 4.0 MEDIUM 6.5 MEDIUM
Jenkins Performance Plugin 3.20 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
CVE-2021-21699 1 Jenkins 1 Active Choices 2023-11-22 3.5 LOW 5.4 MEDIUM
Jenkins Active Choices Plugin 2.5.6 and earlier does not escape the parameter name of reactive parameters and dynamic reference parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
CVE-2021-21692 1 Jenkins 1 Jenkins 2023-11-22 7.5 HIGH 9.8 CRITICAL
FilePath#renameTo and FilePath#moveAllChildrenTo in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier only check 'read' agent-to-controller access permission on the source path, instead of 'delete'.
CVE-2021-21691 1 Jenkins 1 Jenkins 2023-11-22 7.5 HIGH 9.8 CRITICAL
Creating symbolic links is possible without the 'symlink' agent-to-controller access control permission in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
CVE-2022-27197 1 Jenkins 1 Dashboard View 2023-11-22 3.5 LOW 5.4 MEDIUM
Jenkins Dashboard View Plugin 2.18 and earlier does not perform URL validation for the Iframe Portlet's Iframe source URL, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure views.
CVE-2021-21690 1 Jenkins 1 Jenkins 2023-11-22 7.5 HIGH 9.8 CRITICAL
Agent processes are able to completely bypass file path filtering by wrapping the file operation in an agent file path in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
CVE-2021-21695 1 Jenkins 1 Jenkins 2023-11-22 6.8 MEDIUM 8.8 HIGH
FilePath#listFiles lists files outside directories that agents are allowed to access when following symbolic links in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
CVE-2021-21693 1 Jenkins 1 Jenkins 2023-11-22 7.5 HIGH 9.8 CRITICAL
When creating temporary files, agent-to-controller access to create those files is only checked after they've been created in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
CVE-2022-27196 1 Jenkins 1 Favorite 2023-11-22 3.5 LOW 5.4 MEDIUM
Jenkins Favorite Plugin 2.4.0 and earlier does not escape the names of jobs in the favorite column, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure or Item/Create permissions.
CVE-2021-21698 1 Jenkins 1 Subversion 2023-11-22 5.0 MEDIUM 7.5 HIGH
Jenkins Subversion Plugin 2.15.0 and earlier does not restrict the name of a file when looking up a subversion key file on the controller from an agent.
CVE-2021-21696 1 Jenkins 1 Jenkins 2023-11-22 7.5 HIGH 9.8 CRITICAL
Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not limit agent read/write access to the libs/ directory inside build directories when using the FilePath APIs, allowing attackers in control of agent processes to replace the code of a trusted library with a modified variant. This results in unsandboxed code execution in the Jenkins controller process.
CVE-2022-27198 1 Jenkins 1 Cloudbees Aws Credentials 2023-11-22 6.0 MEDIUM 8.0 HIGH
A cross-site request forgery (CSRF) vulnerability in Jenkins CloudBees AWS Credentials Plugin 189.v3551d5642995 and earlier allows attackers with Overall/Read permission to connect to an AWS service using an attacker-specified token.
CVE-2021-21694 1 Jenkins 1 Jenkins 2023-11-22 7.5 HIGH 9.8 CRITICAL
FilePath#toURI, FilePath#hasSymlink, FilePath#absolutize, FilePath#isDescendant, and FilePath#get*DiskSpace do not check any permissions in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
CVE-2022-27195 1 Jenkins 1 Parameterized Trigger 2023-11-22 2.1 LOW 5.5 MEDIUM
Jenkins Parameterized Trigger Plugin 2.43 and earlier captures environment variables passed to builds triggered using Jenkins Parameterized Trigger Plugin, including password parameter values, in their `build.xml` files. These values are stored unencrypted and can be viewed by users with access to the Jenkins controller file system.
CVE-2021-21682 2 Jenkins, Microsoft 2 Jenkins, Windows 2023-11-22 4.0 MEDIUM 4.3 MEDIUM
Jenkins 2.314 and earlier, LTS 2.303.1 and earlier accepts names of jobs and other entities with a trailing dot character, potentially replacing the configuration and data of other entities on Windows.
CVE-2021-21681 1 Jenkins 1 Nomad 2023-11-22 2.1 LOW 5.5 MEDIUM
Jenkins Nomad Plugin 0.7.4 and earlier stores Docker passwords unencrypted in the global config.xml file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
CVE-2021-21679 1 Jenkins 1 Azure Ad 2023-11-22 6.8 MEDIUM 8.8 HIGH
Jenkins Azure AD Plugin 179.vf6841393099e and earlier allows attackers to craft URLs that would bypass the CSRF protection of any target URL in Jenkins.
CVE-2021-21684 1 Jenkins 1 Git 2023-11-22 4.3 MEDIUM 6.1 MEDIUM
Jenkins Git Plugin 4.8.2 and earlier does not escape the Git SHA-1 checksum parameters provided to commit notifications when displaying them in a build cause, resulting in a stored cross-site scripting (XSS) vulnerability.
CVE-2022-25211 1 Jenkins 1 Swamp 2023-11-22 6.5 MEDIUM 8.8 HIGH
A missing permission check in Jenkins SWAMP Plugin 1.2.6 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified web server using attacker-specified credentials.
CVE-2021-21685 1 Jenkins 1 Jenkins 2023-11-22 6.4 MEDIUM 9.1 CRITICAL
Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not check agent-to-controller access to create parent directories in FilePath#mkdirs.
CVE-2022-25212 1 Jenkins 1 Swamp 2023-11-22 6.8 MEDIUM 8.8 HIGH
A cross-site request forgery (CSRF) vulnerability in Jenkins SWAMP Plugin 1.2.6 and earlier allows attackers to connect to an attacker-specified web server using attacker-specified credentials.
CVE-2021-21686 1 Jenkins 1 Jenkins 2023-11-22 5.8 MEDIUM 8.1 HIGH
File path filters in the agent-to-controller security subsystem of Jenkins 2.318 and earlier, LTS 2.303.2 and earlier do not canonicalize paths, allowing operations to follow symbolic links to outside allowed directories.
CVE-2021-21683 2 Jenkins, Microsoft 2 Jenkins, Windows 2023-11-22 4.0 MEDIUM 6.5 MEDIUM
The file browser in Jenkins 2.314 and earlier, LTS 2.303.1 and earlier may interpret some paths to files as absolute on Windows, resulting in a path traversal vulnerability allowing attackers with Overall/Read permission (Windows controller) or Job/Workspace permission (Windows agents) to obtain the contents of arbitrary files.