Vulnerabilities > Jenkins > S3 Publisher
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-05-11 | CVE-2021-21650 | Unspecified vulnerability in Jenkins S3 Publisher Jenkins S3 publisher Plugin 0.11.6 and earlier does not perform Run/Artifacts permission checks in various HTTP endpoints and API models, allowing attackers with Item/Read permission to obtain information about artifacts uploaded to S3, if the optional Run/Artifacts permission is enabled. | 4.3 |
2021-05-11 | CVE-2021-21651 | Unspecified vulnerability in Jenkins S3 Publisher Jenkins S3 publisher Plugin 0.11.6 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to obtain the list of configured profiles. | 4.3 |
2020-02-12 | CVE-2020-2114 | Insufficiently Protected Credentials vulnerability in Jenkins S3 Publisher Jenkins S3 publisher Plugin 0.11.4 and earlier transmits configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure. | 7.5 |
2018-05-08 | CVE-2018-1000177 | Cross-site Scripting vulnerability in Jenkins S3 Publisher A cross-site scripting vulnerability exists in Jenkins S3 Plugin 0.10.12 and older in src/main/resources/hudson/plugins/s3/S3ArtifactsProjectAction/jobMain.jelly that allows attackers able to control file names of uploaded files to define file names containing JavaScript that would be executed in another user's browser when that user performs some UI actions. | 3.5 |