Vulnerabilities > Jenkins > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-12-17 | CVE-2019-16562 | Cross-site Scripting vulnerability in Jenkins Buildgraph-View Jenkins buildgraph-view Plugin 1.8 and earlier does not escape the description of builds shown in its view, resulting in a stored XSS vulnerability exploitable by users able to change build descriptions. | 5.4 |
2019-12-17 | CVE-2019-16559 | Incorrect Default Permissions vulnerability in Jenkins Websphere Deployer A missing permission check in Jenkins WebSphere Deployer Plugin 1.6.1 and earlier allows attackers with Overall/Read permission to perform connection tests and determine whether files with an attacker-specified path exist on the Jenkins master file system. | 5.4 |
2019-12-17 | CVE-2019-16557 | Insufficiently Protected Credentials vulnerability in Jenkins Redgate SQL Change Automation Jenkins Redgate SQL Change Automation Plugin 2.0.3 and earlier stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | 6.5 |
2019-12-17 | CVE-2019-16556 | Insufficiently Protected Credentials vulnerability in Jenkins Rundeck Jenkins Rundeck Plugin 3.6.5 and earlier stores credentials unencrypted in its global configuration file and in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | 6.5 |
2019-12-17 | CVE-2019-16555 | Resource Exhaustion vulnerability in Jenkins Build Failure Analyzer A user-supplied regular expression in Jenkins Build Failure Analyzer Plugin 1.24.1 and earlier was processed in a way that wasn't interruptible, allowing attackers to have Jenkins evaluate a regular expression without the ability to interrupt this process. | 6.5 |
2019-12-17 | CVE-2019-16554 | Incorrect Default Permissions vulnerability in Jenkins Build Failure Analyzer A missing permission check in Jenkins Build Failure Analyzer Plugin 1.24.1 and earlier allows attackers with Overall/Read permission to have Jenkins evaluate a computationally expensive regular expression. | 4.3 |
2019-12-17 | CVE-2019-16552 | Incorrect Default Permissions vulnerability in Jenkins Gerrit Trigger A missing permission check in Jenkins Gerrit Trigger Plugin 2.30.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified HTTP URL or SSH server using attacker-specified credentials, or determine the existence of a file with a given path on the Jenkins master. | 5.4 |
2019-11-21 | CVE-2019-16547 | Missing Authorization vulnerability in Jenkins Google Compute Engine Missing permission checks in various API endpoints in Jenkins Google Compute Engine Plugin 4.1.1 and earlier allow attackers with Overall/Read permission to obtain limited information about the plugin configuration and environment. | 4.3 |
2019-11-21 | CVE-2019-16546 | Authorization Bypass Through User-Controlled Key vulnerability in Jenkins Google Compute Engine Jenkins Google Compute Engine Plugin 4.1.1 and earlier does not verify SSH host keys when connecting agents created by the plugin, enabling man-in-the-middle attacks. | 5.9 |
2019-11-21 | CVE-2019-16543 | Insufficiently Protected Credentials vulnerability in Jenkins Spira Importer 3.2.2 Jenkins Spira Importer Plugin 3.2.2 and earlier stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | 5.5 |