Vulnerabilities > Jenkins
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-12-13 | CVE-2023-50770 | Insufficiently Protected Credentials vulnerability in Jenkins Openid Jenkins OpenId Connect Authentication Plugin 2.6 and earlier stores a password of a local user account used as an anti-lockout feature in a recoverable format, allowing attackers with access to the Jenkins controller file system to recover the plain text password of that account, likely gaining administrator access to Jenkins. | 6.7 |
2023-12-13 | CVE-2023-50771 | Open Redirect vulnerability in Jenkins Openid Jenkins OpenId Connect Authentication Plugin 2.6 and earlier improperly determines that a redirect URL after login is legitimately pointing to Jenkins, allowing attackers to perform phishing attacks. | 6.1 |
2023-12-13 | CVE-2023-50772 | Cleartext Storage of Sensitive Information vulnerability in Jenkins Dingding Json Pusher Jenkins Dingding JSON Pusher Plugin 2.0 and earlier stores access tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system. | 4.3 |
2023-12-13 | CVE-2023-50773 | Cleartext Storage of Sensitive Information vulnerability in Jenkins Dingding Json Pusher Jenkins Dingding JSON Pusher Plugin 2.0 and earlier does not mask access tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them. | 4.3 |
2023-12-13 | CVE-2023-50774 | Cross-Site Request Forgery (CSRF) vulnerability in Jenkins Html Resource 1.01/1.02 A cross-site request forgery (CSRF) vulnerability in Jenkins HTMLResource Plugin 1.02 and earlier allows attackers to delete arbitrary files on the Jenkins controller file system. | 8.1 |
2023-12-13 | CVE-2023-50775 | Cross-Site Request Forgery (CSRF) vulnerability in Jenkins Deployment Dashboard A cross-site request forgery (CSRF) vulnerability in Jenkins Deployment Dashboard Plugin 1.0.10 and earlier allows attackers to copy jobs. | 4.3 |
2023-12-13 | CVE-2023-50776 | Cleartext Storage of Sensitive Information vulnerability in Jenkins Paaslane Estimate 1.0.4 Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier stores PaaSLane authentication tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system. | 4.3 |
2023-12-13 | CVE-2023-50777 | Cleartext Storage of Sensitive Information vulnerability in Jenkins Paaslane Estimate 1.0.4 Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier does not mask PaaSLane authentication tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them. | 4.3 |
2023-12-13 | CVE-2023-50778 | Cross-Site Request Forgery (CSRF) vulnerability in Jenkins Paaslane Estimate 1.0.4 A cross-site request forgery (CSRF) vulnerability in Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier allows attackers to connect to an attacker-specified URL using an attacker-specified token. | 8.8 |
2023-12-13 | CVE-2023-50779 | Missing Authorization vulnerability in Jenkins Paaslane Estimate 1.0.4 Missing permission checks in Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified URL using an attacker-specified token. | 4.3 |