Vulnerabilities > Jenkins
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-01-26 | CVE-2023-24441 | XXE vulnerability in Jenkins Mstest Jenkins MSTest Plugin 1.0.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | 9.8 |
2023-01-26 | CVE-2023-24442 | Cleartext Storage of Sensitive Information vulnerability in Jenkins Github Pull Request Coverage Status Jenkins GitHub Pull Request Coverage Status Plugin 2.2.0 and earlier stores the GitHub Personal Access Token, Sonar access token and Sonar password unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system. | 5.5 |
2023-01-26 | CVE-2023-24443 | XXE vulnerability in Jenkins Testcomplete Support Jenkins TestComplete support Plugin 2.8.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | 9.8 |
2023-01-26 | CVE-2023-24444 | Improper Resource Shutdown or Release vulnerability in Jenkins Openid Jenkins OpenID Plugin 2.4 and earlier does not invalidate the previous session on login. | 9.8 |
2023-01-26 | CVE-2023-24445 | Open Redirect vulnerability in Jenkins Openid Jenkins OpenID Plugin 2.4 and earlier improperly determines that a redirect URL after login is legitimately pointing to Jenkins. | 6.1 |
2023-01-26 | CVE-2023-24446 | Cross-Site Request Forgery (CSRF) vulnerability in Jenkins Openid A cross-site request forgery (CSRF) vulnerability in Jenkins OpenID Plugin 2.4 and earlier allows attackers to trick users into logging in to the attacker's account. | 8.8 |
2023-01-26 | CVE-2023-24447 | Cross-Site Request Forgery (CSRF) vulnerability in Jenkins Rabbitmq Consumer 2.8 A cross-site request forgery (CSRF) vulnerability in Jenkins RabbitMQ Consumer Plugin 2.8 and earlier allows attackers to connect to an attacker-specified AMQP(S) URL using attacker-specified username and password. | 8.8 |
2023-01-26 | CVE-2023-24448 | Missing Authorization vulnerability in Jenkins Rabbitmq Consumer 2.8 A missing permission check in Jenkins RabbitMQ Consumer Plugin 2.8 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified AMQP(S) URL using attacker-specified username and password. | 6.5 |
2023-01-26 | CVE-2023-24449 | Path Traversal vulnerability in Jenkins Pwauth Security Realm 0.3/0.4 Jenkins PWauth Security Realm Plugin 0.4 and earlier does not restrict the names of files in methods implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system. | 4.3 |
2023-01-26 | CVE-2023-24450 | Cleartext Storage of Sensitive Information vulnerability in Jenkins View-Cloner 1.0/1.1 Jenkins view-cloner Plugin 1.1 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system. | 6.5 |