Skip to content
  • coron
  • coron

Gadget Gate

Header Image
Author

GitHub

589 Posts

Featured

Posted byGitHub
[semantic-release] Exposure of Sensitive Information to an Unauthorized Actor in semantic-release
Posted byGitHub
[cookiecutter] OS Command Injection in cookiecutter
Posted byGitHub
[mechanize] Authorization header leak on port redirect in mechanize
Posted byGitHub
[guzzlehttp/guzzle] Failure to strip the Cookie header on change in host or HTTP downgrade

[org.jenkins-ci.plugins:autocomplete-parameter] Cross-site Scripting in Jenkins Autocomplete Parameter Plugin

  • Posted inUncategorized
  • Posted byGitHub
  • 05/18/202206/02/2022

Jenkins Autocomplete Parameter Plugin 1.1 and earlier does not escape the name of Dropdown Autocomplete and Auto Complete String parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by at…

[org.jenkins-ci.plugins:global-variable-string-parameter] Cross-site Scripting in Jenkins Global Variable String Parameter Plugin

  • Posted inUncategorized
  • Posted byGitHub
  • 05/18/202206/02/2022

Jenkins Global Variable String Parameter Plugin 1.2 and earlier does not escape the name and description of Global Variable String parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by …

[io.jenkins.plugins:multiselect-parameter] Cross-site Scripting in Jenkins Multiselect parameter Plugin

  • Posted inUncategorized
  • Posted byGitHub
  • 05/18/202206/02/2022

Jenkins Multiselect parameter Plugin 1.3 and earlier does not escape the name and description of Multiselect parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Co…

[org.jvnet.hudson.plugins:selection-tasks-plugin] Cross site scripting in Jenkins Selection tasks Plugin

  • Posted inUncategorized
  • Posted byGitHub
  • 05/18/202206/02/2022

Jenkins Selection tasks Plugin 1.0 and earlier does not escape the name and description of Script Selection task variable parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers…

[org.jenkins-ci.plugins:gitlab-plugin] Missing permission check in Jenkins GitLab Plugin

  • Posted inUncategorized
  • Posted byGitHub
  • 05/18/202206/02/2022

Jenkins GitLab Plugin 1.5.31 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. An enumeration of credentials IDs in GitLab…

[io.jenkins.blueocean:blueocean-parent] Cross Site Request Forgery in Jenkins Blue Ocean Plugin

  • Posted inUncategorized
  • Posted byGitHub
  • 05/18/202206/02/2022

A cross-site request forgery (CSRF) vulnerability in Jenkins Blue Ocean Plugin 1.25.3 and earlier allows attackers to connect to an attacker-specified HTTP server. Blue Ocean Plugin 1.25.4 requires POST requests and the appropriate permissions for the …

[org.jenkins-ci.plugins:ssh] Cross Site Request Forgery in Jenkins SSH Plugin

  • Posted inUncategorized
  • Posted byGitHub
  • 05/18/202206/02/2022

A cross-site request forgery (CSRF) vulnerability in Jenkins SSH Plugin 2.6.1 and earlier allows attackers to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials st…

[org.jenkins-ci.plugins:windows-slaves] Missing Authorization in Jenkins WMI Windows Agents plugin

  • Posted inUncategorized
  • Posted byGitHub
  • 05/18/202206/02/2022

Jenkins WMI Windows Agents Plugin 1.8 and earlier includes the Windows Remote Command library does not implement access control, potentially allowing users to start processes even if they’re not allowed to log in. WMI Windows Agents Plugin 1.8.1 no lon…

[org.jenkins-ci.plugins:repo] Path traversal in Jenkins REPO Plugin

  • Posted inUncategorized
  • Posted byGitHub
  • 05/18/202206/03/2022

Jenkins REPO Plugin 1.14.0 and earlier allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller’s file system using local paths as SCM URLs, obtaining limited information about other projects’ SCM…

[io.jenkins.blueocean:blueocean-pipeline-scm-api] Insufficiently Protected Credentials in Jenkins Pipeline SCM API for Blue Ocean Plugin

  • Posted inUncategorized
  • Posted byGitHub
  • 05/18/202206/02/2022

Jenkins Pipeline SCM API for Blue Ocean Plugin 1.25.3 and earlier allows attackers with Job/Configure permission to access credentials with attacker-specified IDs stored in the private per-user credentials stores of any attacker-specified user in Jenki…

Posts navigation

Previous Posts 1 … 17 18 19 20 21 … 59 Next Posts
Gadget Gate
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close