A missing permission check in Jenkins Git Plugin 4.11.3 and earlier allows unauthenticated attackers to trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit.
Reference…
[com.compuware.jenkins:compuware-ispw-operations] Jenkins Compuware ISPW Operations Plugin before 1.0.9 vulnerable to protection mechanism failure
Jenkins Compuware ISPW Operations Plugin 1.0.8 and earlier does not restrict execution of a controller/agent message to agents, allowing attackers able to control agent processes to retrieve Java system properties.
References
https://nvd.nist.gov/vuln…
[com.compuware.jenkins:compuware-zadviser-api] Jenkins Compuware zAdviser API Plugin before 1.0.4 vulnerable to protection mechanism failure
Jenkins Compuware zAdviser API Plugin 1.0.3 and earlier does not restrict execution of a controller/agent message to agents, allowing attackers able to control agent processes to retrieve Java system properties.
References
https://nvd.nist.gov/vuln/de…
[org.jenkins-ci.plugins:repository-connector] Jenkins Repository Connector Plugin does not perform a permission check in a method implementing form validation
Jenkins Repository Connector Plugin 2.2.0 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jen…
[org.jenkins-ci.plugins:openshift-deployer] OpenShift Deployer Plugin does not perform permission checks in methods implementing form validation
A missing permission check in Jenkins OpenShift Deployer Plugin 1.2.0 and earlier allows attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system and to upload a SSH key …
[org.jenkins-ci.plugins:repository-connector] Jenkins Repository Connector Plugin allows attackers with Overall/Read permission to enumerate credentials IDs
A missing permission check in Jenkins Repository Connector Plugin 2.2.0 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
References
https://nvd.nist.gov/vuln/detail/CVE-2022-36903…
[org.jenkins-ci.plugins:openshift-deployer] Jenkins OpenShift Deployer Plugin allows connection to attacker-specified URL using attacker-specified credentials
A cross-site request forgery (CSRF) vulnerability in Jenkins OpenShift Deployer Plugin 1.2.0 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified username and password.
References
https://nvd.nist.gov/vuln/deta…
[org.jenkins-ci.plugins:http_request] Jenkins HTTP Request Plugin stores HTTP Request passwords unencrypted
Jenkins HTTP Request Plugin 1.15 and earlier stores HTTP Request passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
References
https://n…
[org.jenkins-ci.plugins:openshift-deployer] Jenkins OpenShift Deployer Plugin allows attackers to check for file path, upload SSH key file
A cross-site request forgery (CSRF) vulnerability in Jenkins OpenShift Deployer Plugin 1.2.0 and earlier allows attackers to check for the existence of an attacker-specified file path on the Jenkins controller file system and to upload a SSH key file f…
[org.jenkins-ci.plugins:openshift-deployer] Jenkins OpenShift Deployer Plugin does not perform a permission check in a method implementing form validation
A missing permission check in Jenkins OpenShift Deployer Plugin 1.2.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified username and password.
References
https://nvd.nist.gov/vul…