CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  What's the CVSS score of your company?
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Jenkins : Security Vulnerabilities (CVSS score between 4 and 4.99)

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
251 CVE-2019-10400 Exec Code Bypass 2019-09-12 2021-11-02
4.9
None Remote Medium ??? Partial Partial None
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of subexpressions in increment and decrement expressions not involving actual assignment allowed attackers to execute arbitrary code in sandboxed scripts.
252 CVE-2019-10399 Exec Code Bypass 2019-09-12 2021-11-02
4.9
None Remote Medium ??? Partial Partial None
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of property names in property expressions in increment and decrement expressions allowed attackers to execute arbitrary code in sandboxed scripts.
253 CVE-2019-10394 Exec Code Bypass 2019-09-12 2021-11-02
4.9
None Remote Medium ??? Partial Partial None
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of property names in property expressions on the left-hand side of assignment expressions allowed attackers to execute arbitrary code in sandboxed scripts.
254 CVE-2019-10393 Exec Code Bypass 2019-09-12 2021-11-02
4.9
None Remote Medium ??? Partial Partial None
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of method names in method call expressions allowed attackers to execute arbitrary code in sandboxed scripts.
255 CVE-2019-10391 319 2019-08-28 2020-10-02
4.3
None Remote Medium Not required Partial None None
Jenkins IBM Application Security on Cloud Plugin 1.2.4 and earlier transmitted configured passwords in plain text as part of job configuration forms, potentially resulting in their exposure.
256 CVE-2019-10389 862 2019-08-07 2020-10-01
4.0
None Remote Low ??? None Partial None
A missing permission check in Jenkins Relution Enterprise Appstore Publisher Plugin 1.24 and earlier allows attackers to have Jenkins initiate an HTTP connection to an attacker-specified server.
257 CVE-2019-10388 352 CSRF 2019-08-07 2019-10-09
4.3
None Remote Medium Not required None Partial None
A cross-site request forgery vulnerability in Jenkins Relution Enterprise Appstore Publisher Plugin 1.24 and earlier allows attackers to have Jenkins initiate an HTTP connection to an attacker-specified server.
258 CVE-2019-10387 862 2019-08-07 2020-10-02
4.0
None Remote Low ??? Partial None None
A missing permission check in Jenkins XL TestView Plugin 1.2.0 and earlier in XLTestView.XLTestDescriptor#doTestConnection allows users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
259 CVE-2019-10385 522 2019-08-07 2020-10-01
4.0
None Remote Low ??? Partial None None
Jenkins eggPlant Plugin 2.2 and earlier stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
260 CVE-2019-10381 295 2019-08-07 2019-10-09
4.3
None Remote Medium Not required Partial None None
Jenkins Codefresh Integration Plugin 1.8 and earlier disables SSL/TLS and hostname verification globally for the Jenkins master JVM.
261 CVE-2019-10377 862 2019-08-07 2020-10-01
4.0
None Remote Low ??? None Partial None
A missing permission check in Jenkins Avatar Plugin 1.2 and earlier allows attackers with Overall/Read access to change the avatar of any user of Jenkins.
262 CVE-2019-10376 79 XSS 2019-08-07 2019-10-09
4.3
None Remote Medium Not required None Partial None
A reflected cross-site scripting vulnerability in Jenkins Wall Display Plugin 0.6.34 and earlier allows attackers to inject arbitrary HTML and JavaScript into web pages provided by this plugin.
263 CVE-2019-10375 2019-08-07 2020-10-02
4.0
None Remote Low ??? Partial None None
An arbitrary file read vulnerability in Jenkins File System SCM Plugin 2.1 and earlier allows attackers able to configure jobs in Jenkins to obtain the contents of any file on the Jenkins master.
264 CVE-2019-10370 532 2019-08-07 2020-10-02
4.3
None Remote Medium Not required Partial None None
Jenkins Mask Passwords Plugin 2.12.0 and earlier transmits globally configured passwords in plain text as part of the configuration form, potentially resulting in their exposure.
265 CVE-2019-10369 862 2019-08-07 2020-10-01
4.0
None Remote Low ??? Partial None None
A missing permission check in Jenkins JClouds Plugin 2.14 and earlier in BlobStoreProfile.DescriptorImpl#doTestConnection and JCloudsCloud.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
266 CVE-2019-10366 522 2019-07-31 2020-10-01
4.0
None Remote Low ??? Partial None None
Jenkins Skytap Cloud CI Plugin 2.06 and earlier stored credentials unencrypted in job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system.
267 CVE-2019-10363 319 2019-07-31 2020-10-02
4.0
None Remote Low ??? Partial None None
Jenkins Configuration as Code Plugin 1.24 and earlier did not reliably identify sensitive values expected to be exported in their encrypted form.
268 CVE-2019-10358 532 2019-07-31 2021-10-28
4.0
None Remote Low ??? Partial None None
Jenkins Maven Integration Plugin 3.3 and earlier did not apply build log decorators to module builds, potentially revealing sensitive build variables in the build log.
269 CVE-2019-10357 862 +Info 2019-07-31 2020-10-02
4.0
None Remote Low ??? Partial None None
A missing permission check in Jenkins Pipeline: Shared Groovy Libraries Plugin 2.14 and earlier allowed users with Overall/Read access to obtain limited information about the content of SCM repositories referenced by global libraries.
270 CVE-2019-10354 862 Bypass +Info 2019-07-17 2020-10-02
4.0
None Remote Low ??? Partial None None
A vulnerability in the Stapler web framework used in Jenkins 2.185 and earlier, LTS 2.176.1 and earlier allowed attackers to access view fragments directly, bypassing permission checks and possibly obtain sensitive information.
271 CVE-2019-10352 22 Dir. Trav. 2019-07-17 2019-08-15
4.0
None Remote Low ??? None Partial None
A path traversal vulnerability in Jenkins 2.185 and earlier, LTS 2.176.1 and earlier in core/src/main/java/hudson/model/FileParameterValue.java allowed attackers with Job/Configure permission to define a file parameter with a file name outside the intended directory, resulting in an arbitrary file write on the Jenkins master when scheduling a build.
272 CVE-2019-10351 312 2019-07-11 2020-10-02
4.0
None Remote Low ??? Partial None None
Jenkins Caliper CI Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
273 CVE-2019-10350 312 2019-07-11 2020-10-02
4.0
None Remote Low ??? Partial None None
Jenkins Port Allocator Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
274 CVE-2019-10348 312 2019-07-11 2020-10-01
4.0
None Remote Low ??? Partial None None
Jenkins Gogs Plugin stored credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
275 CVE-2019-10347 522 2019-07-11 2020-10-02
4.0
None Remote Low ??? Partial None None
Jenkins Mashup Portlets Plugin stored credentials unencrypted on the Jenkins master where they can be viewed by users with access to the master file system.
276 CVE-2019-10346 79 XSS 2019-07-11 2019-10-09
4.3
None Remote Medium Not required None Partial None
A reflected cross site scripting vulnerability in Jenkins Embeddable Build Status Plugin 2.0.1 and earlier allowed attackers inject arbitrary HTML and JavaScript into the response of this plugin.
277 CVE-2019-10344 862 2019-07-31 2020-10-02
4.0
None Remote Low ??? Partial None None
Missing permission checks in Jenkins Configuration as Code Plugin 1.24 and earlier in various HTTP endpoints allowed users with Overall/Read access to access the generated schema and documentation for this plugin containing detailed information about installed plugins.
278 CVE-2019-10342 862 2019-07-11 2020-10-01
4.0
None Remote Low ??? Partial None None
A missing permission check in Jenkins Docker Plugin 1.1.6 and earlier in various 'fillCredentialsIdItems' methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins.
279 CVE-2019-10341 862 2019-07-11 2020-10-01
4.0
None Remote Low ??? Partial None None
A missing permission check in Jenkins Docker Plugin 1.1.6 and earlier in DockerAPI.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
280 CVE-2019-10339 862 2019-06-11 2020-10-01
4.0
None Remote Low ??? Partial None None
A missing permission check in Jenkins JX Resources Plugin 1.0.36 and earlier in GlobalPluginConfiguration#doValidateClient allowed users with Overall/Read access to have Jenkins connect to an attacker-specified Kubernetes server, potentially leaking credentials.
281 CVE-2019-10336 79 XSS 2019-06-11 2019-06-13
4.3
None Remote Medium Not required None Partial None
A reflected cross site scripting vulnerability in Jenkins ElectricFlow Plugin 1.1.6 and earlier allowed attackers able to control the output of the ElectricFlow API to inject arbitrary HTML and JavaScript in job configuration forms containing post-build steps provided by this plugin.
282 CVE-2019-10333 862 +Info 2019-06-11 2020-10-02
4.0
None Remote Low ??? Partial None None
Missing permission checks in Jenkins ElectricFlow Plugin 1.1.5 and earlier in various HTTP endpoints allowed users with Overall/Read access to obtain information about the Jenkins ElectricFlow Plugin configuration and configuration of connected ElectricFlow instances.
283 CVE-2019-10332 862 2019-06-11 2020-10-01
4.3
None Remote Medium Not required None Partial None
A missing permission check in Jenkins ElectricFlow Plugin 1.1.5 and earlier in Configuration#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials.
284 CVE-2019-10331 352 CSRF 2019-06-11 2019-06-13
4.3
None Remote Medium Not required None Partial None
A cross-site request forgery vulnerability in Jenkins ElectricFlow Plugin 1.1.5 and earlier in Configuration#doTestConnection allowed attackers to connect to an attacker-specified URL using attacker-specified credentials.
285 CVE-2019-10326 352 CSRF 2019-05-31 2019-06-03
4.3
None Remote Medium Not required None Partial None
A cross-site request forgery vulnerability in Jenkins Warnings NG Plugin 5.0.0 and earlier allowed attackers to reset warning counts for future builds.
286 CVE-2019-10320 538 2019-05-21 2019-06-11
4.0
None Remote Low ??? Partial None None
Jenkins Credentials Plugin 2.1.18 and earlier allowed users with permission to create or update credentials to confirm the existence of files on the Jenkins master with an attacker-specified path, and obtain the certificate content of files containing a PKCS#12 certificate.
287 CVE-2019-10319 862 +Info 2019-05-21 2020-10-02
4.0
None Remote Low ??? Partial None None
A missing permission check in Jenkins PAM Authentication Plugin 1.5 and earlier, except 1.4.1 in PamSecurityRealm.DescriptorImpl#doTest allowed users with Overall/Read permission to obtain limited information about the file /etc/shadow and the user Jenkins is running as.
288 CVE-2019-10318 522 2019-04-30 2020-10-02
4.0
None Remote Low ??? Partial None None
Jenkins Azure AD Plugin 0.3.3 and earlier stored the client secret unencrypted in the global config.xml configuration file on the Jenkins master where it could be viewed by users with access to the master file system.
289 CVE-2019-10317 295 2019-04-30 2019-05-06
4.3
None Remote Medium Not required Partial None None
Jenkins SiteMonitor Plugin 0.5 and earlier disabled SSL/TLS and hostname verification globally for the Jenkins master JVM.
290 CVE-2019-10316 522 2019-04-30 2020-10-02
4.0
None Remote Low ??? Partial None None
Jenkins Aqua MicroScanner Plugin 1.0.5 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.
291 CVE-2019-10314 295 2019-04-30 2019-05-06
4.3
None Remote Medium Not required Partial None None
Jenkins Koji Plugin disables SSL/TLS and hostname verification globally for the Jenkins master JVM.
292 CVE-2019-10313 522 2019-04-30 2020-10-01
4.0
None Remote Low ??? Partial None None
Jenkins Twitter Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
293 CVE-2019-10312 862 2019-04-30 2020-10-01
4.0
None Remote Low ??? Partial None None
A missing permission check in Jenkins Ansible Tower Plugin 0.9.1 and earlier in the TowerInstallation.TowerInstallationDescriptor#doFillTowerCredentialsIdItems method allowed attackers with Overall/Read permission to enumerate credentials ID of credentials stored in Jenkins.
294 CVE-2019-10311 862 2019-04-30 2020-10-01
4.0
None Remote Low ??? Partial None None
A missing permission check in Jenkins Ansible Tower Plugin 0.9.1 and earlier in the TowerInstallation.TowerInstallationDescriptor#doTestTowerConnection form validation method allowed attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
295 CVE-2019-10309 611 2019-04-30 2019-05-06
4.8
None Local Network Low Not required Partial None Partial
Jenkins Self-Organizing Swarm Plug-in Modules Plugin clients that use UDP broadcasts to discover Jenkins masters do not prevent XML External Entity processing when processing the responses, allowing unauthorized attackers on the same network to read arbitrary files from Swarm clients.
296 CVE-2019-10308 862 2019-04-30 2020-10-02
4.0
None Remote Low ??? None Partial None
A missing permission check in Jenkins Static Analysis Utilities Plugin 1.95 and earlier in the DefaultGraphConfigurationView#doSave form handler method allowed attackers with Overall/Read permission to change the per-job default graph configuration for all users.
297 CVE-2019-10307 352 CSRF 2019-04-30 2019-05-06
4.3
None Remote Medium Not required None Partial None
A cross-site request forgery vulnerability in Jenkins Static Analysis Utilities Plugin 1.95 and earlier in the DefaultGraphConfigurationView#doSave form handler method allowed attackers to change the per-job default graph configuration for all users.
298 CVE-2019-10305 862 2019-04-18 2020-10-02
4.0
None Remote Low ??? None Partial None
A missing permission check in Jenkins XebiaLabs XL Deploy Plugin in the Credential#doValidateUserNamePassword form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.
299 CVE-2019-10304 352 CSRF 2019-04-18 2019-10-09
4.3
None Remote Medium Not required None Partial None
A cross-site request forgery vulnerability in Jenkins XebiaLabs XL Deploy Plugin in the Credential#doValidateUserNamePassword form validation method allows attackers to initiate a connection to an attacker-specified server.
300 CVE-2019-10303 522 2019-04-18 2020-10-02
4.0
None Remote Low ??? Partial None None
Jenkins Azure PublisherSettings Credentials Plugin 1.2 and earlier stored credentials unencrypted in the credentials.xml file on the Jenkins master where they could be viewed by users with access to the master file system.
Total number of vulnerabilities : 442   Page : 1 2 3 4 5 6 (This Page)7 8 9
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.