Jenkins Log Command Plugin 1.0.2 and earlier does not disable a feature of its command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read content from arbitrary files on the Jenkins controller file system.
Source: Jenkins Project
Max CVSS
7.5
EPSS Score
0.09%
Published
2024-01-24
Updated
2024-01-29

CVE-2023-44487

Known exploited
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Source: MITRE
Max CVSS
7.5
EPSS Score
70.76%
Published
2023-10-10
Updated
2024-06-27
CISA KEV Added
2023-10-10
Jenkins Bitbucket Push and Pull Request Plugin 2.4.0 through 2.8.3 (both inclusive) trusts values provided in the webhook payload, including certain URLs, and uses configured Bitbucket credentials to connect to those URLs, allowing attackers to capture Bitbucket credentials stored in Jenkins by sending a crafted webhook payload.
Source: Jenkins Project
Max CVSS
7.5
EPSS Score
0.09%
Published
2023-09-06
Updated
2023-09-11
Jenkins Google Login Plugin 1.7 and earlier uses a non-constant time comparison function when checking whether the provided and expected token are equal, potentially allowing attackers to use statistical methods to obtain a valid token.
Source: Jenkins Project
Max CVSS
7.5
EPSS Score
0.09%
Published
2023-09-06
Updated
2023-09-11
Jenkins Azure AD Plugin 396.v86ce29279947 and earlier, except 378.380.v545b_1154b_3fb_, uses a non-constant time comparison function when checking whether the provided and expected CSRF protection nonce are equal, potentially allowing attackers to use statistical methods to obtain a valid nonce.
Source: Jenkins Project
Max CVSS
7.5
EPSS Score
0.09%
Published
2023-09-06
Updated
2023-09-11
Jenkins NodeJS Plugin 1.6.0 and earlier does not properly mask (i.e., replace with asterisks) credentials specified in the Npm config file in Pipeline build logs.
Source: Jenkins Project
Max CVSS
7.5
EPSS Score
0.09%
Published
2023-08-16
Updated
2023-08-22
Jenkins Config File Provider Plugin 952.va_544a_6234b_46 and earlier does not mask (i.e., replace with asterisks) credentials specified in configuration files when they're written to the build log.
Source: Jenkins Project
Max CVSS
7.5
EPSS Score
0.09%
Published
2023-08-16
Updated
2023-08-22
A missing permission check in Jenkins ElasticBox CI Plugin 5.0.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Source: Jenkins Project
Max CVSS
7.1
EPSS Score
0.05%
Published
2023-07-12
Updated
2023-07-20
A missing permission check in Jenkins Orka by MacStadium Plugin 1.33 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Source: Jenkins Project
Max CVSS
7.1
EPSS Score
0.05%
Published
2023-07-12
Updated
2023-07-20
Eclipse Jetty provides a web server and servlet container. In versions 11.0.0 through 11.0.15, 10.0.0 through 10.0.15, and 9.0.0 through 9.4.52, an integer overflow in `MetaDataBuilder.checkSize` allows for HTTP/2 HPACK header values to exceed their size limit. `MetaDataBuilder.java` determines if a header name or value exceeds the size limit, and throws an exception if the limit is exceeded. However, when length is very large and huffman is true, the multiplication by 4 in line 295 will overflow, and length will become negative. `(_size+length)` will now be negative, and the check on line 296 will not be triggered. Furthermore, `MetaDataBuilder.checkSize` allows for user-entered HPACK header value sizes to be negative, potentially leading to a very large buffer allocation later on when the user-entered size is multiplied by 2. This means that if a user provides a negative length value (or, more precisely, a length value which, when multiplied by the 4/3 fudge factor, is negative), and this length value is a very large positive number when multiplied by 2, then the user can cause a very large buffer to be allocated on the server. Users of HTTP/2 can be impacted by a remote denial of service attack. The issue has been fixed in versions 11.0.16, 10.0.16, and 9.4.53. There are no known workarounds.
Source: GitHub, Inc.
Max CVSS
7.5
EPSS Score
0.40%
Published
2023-10-10
Updated
2024-06-21
Jenkins HashiCorp Vault Plugin 360.v0a_1c04cf807d and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log when push mode for durable task logging is enabled.
Source: Jenkins Project
Max CVSS
7.5
EPSS Score
0.11%
Published
2023-05-16
Updated
2023-05-25
Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.149 and earlier does not mask credentials displayed on the configuration form, increasing the potential for attackers to observe and capture them.
Source: Jenkins Project
Max CVSS
7.5
EPSS Score
0.11%
Published
2023-05-16
Updated
2023-05-31
Jenkins Thycotic DevOps Secrets Vault Plugin 1.0.0 and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log when push mode for durable task logging is enabled.
Source: Jenkins Project
Max CVSS
7.5
EPSS Score
0.22%
Published
2023-04-12
Updated
2023-04-21
Jenkins Azure Key Vault Plugin 187.va_cd5fecd198a_ and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log when push mode for durable task logging is enabled.
Source: Jenkins Project
Max CVSS
7.5
EPSS Score
0.22%
Published
2023-04-12
Updated
2023-04-21
Jenkins Kubernetes Plugin 3909.v1f2c633e8590 and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log when push mode for durable task logging is enabled.
Source: Jenkins Project
Max CVSS
7.5
EPSS Score
0.22%
Published
2023-04-12
Updated
2023-04-21
Jenkins AbsInt a³ Plugin 1.1.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
Source: Jenkins Project
Max CVSS
7.1
EPSS Score
0.06%
Published
2023-03-22
Updated
2023-03-24
Jenkins Crap4J Plugin 0.9 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
Source: Jenkins Project
Max CVSS
7.5
EPSS Score
0.14%
Published
2023-04-02
Updated
2023-04-08
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier uses the Apache Commons FileUpload library without specifying limits for the number of request parts introduced in version 1.5 for CVE-2023-24998 in org.kohsuke.stapler.RequestImpl, allowing attackers to trigger a denial of service.
Source: Jenkins Project
Max CVSS
7.5
EPSS Score
0.08%
Published
2023-03-10
Updated
2023-03-16
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier uses the Apache Commons FileUpload library without specifying limits for the number of request parts introduced in version 1.5 for CVE-2023-24998 in hudson.util.MultipartFormDataParser, allowing attackers to trigger a denial of service.
Source: Jenkins Project
Max CVSS
7.5
EPSS Score
0.08%
Published
2023-03-10
Updated
2023-03-16
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier creates a temporary file in the default temporary directory with the default permissions for newly created files when uploading a plugin for installation, potentially allowing attackers with access to the Jenkins controller file system to read and write the file before it is used, potentially resulting in arbitrary code execution.
Source: Jenkins Project
Max CVSS
7.0
EPSS Score
0.04%
Published
2023-03-10
Updated
2023-03-16
A missing authorization vulnerability exists in versions of the Jenkins Plug-in for ServiceNow DevOps prior to 1.38.1 that, if exploited successfully, could cause the unwanted exposure of sensitive information. To address this issue, apply the 1.38.1 version of the Jenkins plug-in for ServiceNow DevOps on your Jenkins server. No changes are required on your instances of the Now Platform.
Source: ServiceNow
Max CVSS
7.7
EPSS Score
0.09%
Published
2023-07-26
Updated
2023-08-03
Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.143 and earlier globally and unconditionally disables SSL/TLS certificate and hostname validation for the entire Jenkins controller JVM.
Source: Jenkins Project
Max CVSS
7.5
EPSS Score
0.08%
Published
2022-11-15
Updated
2023-11-01
Jenkins Config Rotator Plugin 2.0.1 and earlier does not restrict a file name query parameter in an HTTP endpoint, allowing unauthenticated attackers to read arbitrary files with '.xml' extension on the Jenkins controller file system.
Source: Jenkins Project
Max CVSS
7.5
EPSS Score
0.16%
Published
2022-11-15
Updated
2023-11-01
A missing permission check in Jenkins CloudBees Docker Hub/Registry Notification Plugin 2.6.2 and earlier allows unauthenticated attackers to trigger builds of jobs corresponding to the attacker-specified repository.
Source: Jenkins Project
Max CVSS
7.5
EPSS Score
0.07%
Published
2022-11-15
Updated
2023-11-13
Jenkins Script Security Plugin 1189.vb_a_b_7c8fd5fde and earlier stores whole-script approvals as the SHA-1 hash of the script, making it vulnerable to collision attacks.
Source: Jenkins Project
Max CVSS
7.5
EPSS Score
0.16%
Published
2022-11-15
Updated
2023-11-22
114 vulnerabilities found
1 2 3 4 5
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!