Vulnerabilities > Jenkins > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-11-29 | CVE-2023-49653 | Insufficiently Protected Credentials vulnerability in Jenkins Jira Jenkins Jira Plugin 3.11 and earlier does not set the appropriate context for credentials lookup, allowing attackers with Item/Configure permission to access and capture credentials they are not entitled to. | 6.5 |
2023-11-29 | CVE-2023-49674 | Missing Authorization vulnerability in Jenkins Neuvector vulnerability Scanner A missing permission check in Jenkins NeuVector Vulnerability Scanner Plugin 1.22 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified hostname and port using attacker-specified username and password. | 4.3 |
2023-10-25 | CVE-2023-46650 | Cross-site Scripting vulnerability in Jenkins Github Jenkins GitHub Plugin 1.37.3 and earlier does not escape the GitHub project URL on the build page when showing changes, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | 5.4 |
2023-10-25 | CVE-2023-46651 | Insufficiently Protected Credentials vulnerability in Jenkins Warnings Jenkins Warnings Plugin 10.5.0 and earlier does not set the appropriate context for credentials lookup, allowing attackers with Item/Configure permission to access and capture credentials they are not entitled to. | 6.5 |
2023-10-25 | CVE-2023-46652 | Missing Authorization vulnerability in Jenkins Lambdatest-Automation A missing permission check in Jenkins lambdatest-automation Plugin 1.20.9 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of LAMBDATEST credentials stored in Jenkins. | 4.3 |
2023-10-25 | CVE-2023-46653 | Cleartext Storage of Sensitive Information vulnerability in Jenkins Lambdatest-Automation Jenkins lambdatest-automation Plugin 1.20.10 and earlier logs LAMBDATEST Credentials access token at the INFO level, potentially resulting in its exposure. | 6.5 |
2023-10-25 | CVE-2023-46655 | Link Following vulnerability in Jenkins Cloudbees CD Jenkins CloudBees CD Plugin 1.1.32 and earlier follows symbolic links to locations outside of the directory from which artifacts are published during the 'CloudBees CD - Publish Artifact' post-build step, allowing attackers able to configure jobs to publish arbitrary files from the Jenkins controller file system to the previously configured CloudBees CD server. | 6.5 |
2023-10-25 | CVE-2023-46656 | Incorrect Comparison vulnerability in Jenkins Multibranch Scan Webhook Trigger Jenkins Multibranch Scan Webhook Trigger Plugin 1.0.9 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token. | 5.3 |
2023-10-25 | CVE-2023-46657 | Incorrect Comparison vulnerability in Jenkins Gogs Jenkins Gogs Plugin 1.0.15 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token. | 5.3 |
2023-10-25 | CVE-2023-46658 | Incorrect Comparison vulnerability in Jenkins Msteams Webhook Trigger 0.1.0/0.1.1 Jenkins MSTeams Webhook Trigger Plugin 0.1.1 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token. | 5.3 |