🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
‼ CVE-2022-36897 ‼

A missing permission check in Jenkins Compuware Xpediter Code Coverage Plugin 1.0.7 and earlier allows attackers with Overall/Read permission to enumerate hosts and ports of Compuware configurations and credentials IDs of credentials stored in Jenkins.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-36919 ‼

A missing permission check in Jenkins Coverity Plugin 1.11.4 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-36908 ‼

A cross-site request forgery (CSRF) vulnerability in Jenkins OpenShift Deployer Plugin 1.2.0 and earlier allows attackers to check for the existence of an attacker-specified file path on the Jenkins controller file system and to upload a SSH key file from the Jenkins controller file system to an attacker-specified URL.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-36909 ‼

A missing permission check in Jenkins OpenShift Deployer Plugin 1.2.0 and earlier allows attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system and to upload a SSH key file from the Jenkins controller file system to an attacker-specified URL.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-36907 ‼

A missing permission check in Jenkins OpenShift Deployer Plugin 1.2.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified username and password.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-36922 ‼

Jenkins Lucene-Search Plugin 370.v62a5f618cd3a and earlier does not escape the search query parameter displayed on the 'search' result page, resulting in a reflected cross-site scripting (XSS) vulnerability.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-36895 ‼

A missing permission check in Jenkins Compuware Topaz Utilities Plugin 1.0.8 and earlier allows attackers with Overall/Read permission to enumerate hosts and ports of Compuware configurations and credentials IDs of credentials stored in Jenkins.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-36913 ‼

Jenkins Openstack Heat Plugin 1.5 and earlier does not perform permission checks in methods implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-23099 ‼

OX App Suite through 7.10.6 allows XSS by forcing block-wise read.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-36915 ‼

Jenkins Android Signing Plugin 2.2.5 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Item/Read permission but without Item/Workspace or Item/Configure permission to check whether attacker-specified file patterns match workspace contents.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-23101 ‼

OX App Suite through 7.10.6 allows XSS via appHandler in a deep link in an e-mail message.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-36889 ‼

Jenkins Deployer Framework Plugin 85.v1d1888e8c021 and earlier does not restrict the application path of the applications when configuring a deployment, allowing attackers with Item/Configure permission to upload arbitrary files from the Jenkins controller file system to the selected service.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-36893 ‼

Jenkins rpmsign-plugin Plugin 0.5.0 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Item/Read permission but without Item/Workspace or Item/Configure permission to check whether attacker-specified file patterns match workspace contents.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-36896 ‼

A missing permission check in Jenkins Compuware Source Code Download for Endevor, PDS, and ISPW Plugin 2.0.12 and earlier allows attackers with Overall/Read permission to enumerate hosts and ports of Compuware configurations and credentials IDs of credentials stored in Jenkins.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-36910 ‼

Jenkins Lucene-Search Plugin 370.v62a5f618cd3a and earlier does not perform a permission check in several HTTP endpoints, allowing attackers with Overall/Read permission to reindex the database and to obtain information about jobs otherwise inaccessible to them.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-2550 ‼

OS Command Injection in GitHub repository hestiacp/hestiacp prior to 1.6.5.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-36916 ‼

A cross-site request forgery (CSRF) vulnerability in Jenkins Google Cloud Backup Plugin 0.6 and earlier allows attackers to request a manual backup.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-36918 ‼

Jenkins Buckminster Plugin 1.1.1 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-36911 ‼

A cross-site request forgery (CSRF) vulnerability in Jenkins Openstack Heat Plugin 1.5 and earlier allows attackers to connect to an attacker-specified URL.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-36901 ‼

Jenkins HTTP Request Plugin 1.15 and earlier stores HTTP Request passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-36920 ‼

A cross-site request forgery (CSRF) vulnerability in Jenkins Coverity Plugin 1.11.4 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

📖 Read

via "National Vulnerability Database".