Vulnerabilities > Jenkins > AWS Codecommit Trigger > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-09-06 | CVE-2023-41941 | Missing Authorization vulnerability in Jenkins AWS Codecommit Trigger 3.0.12 A missing permission check in Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of AWS credentials stored in Jenkins. | 4.3 |
2023-09-06 | CVE-2023-41942 | Cross-Site Request Forgery (CSRF) vulnerability in Jenkins AWS Codecommit Trigger 3.0.12 A cross-site request forgery (CSRF) vulnerability in Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier allows attackers to clear the SQS queue. | 4.3 |
2023-09-06 | CVE-2023-41943 | Missing Authorization vulnerability in Jenkins AWS Codecommit Trigger 3.0.12 Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to clear the SQS queue. | 6.5 |
2023-09-06 | CVE-2023-41944 | Cross-site Scripting vulnerability in Jenkins AWS Codecommit Trigger 3.0.12 Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not escape the queue name parameter passed to a form validation URL, when rendering an error message, resulting in an HTML injection vulnerability. | 6.1 |
2023-06-14 | CVE-2023-35147 | Incorrect Permission Assignment for Critical Resource vulnerability in Jenkins AWS Codecommit Trigger 3.0.12 Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not restrict the AWS SQS queue name path parameter in an HTTP endpoint, allowing attackers with Item/Read permission to obtain the contents of arbitrary files on the Jenkins controller file system. | 6.5 |