Skip to content

トピトピニュース

Header Image
Author

GitHub

1143 Posts

Featured

Posted byGitHub
[github.com/crewjam/saml] crewjam/saml vulnerable to signature bypass via multiple Assertion elements due to improper authentication
Posted byGitHub
[org.keycloak:keycloak-core] Stored Cross-Site Scripting (XSS) in Keycloak via groups dropdown
Posted byGitHub
[bitlyshortener] Package discontinued because Bitly lowered the free quota
Posted byGitHub
[baserproject/basercms] baserproject/basercms vulnerable to cross-site scripting (XSS) vulnerability

[onionshare-cli] Incorrect Permission Assignment for Critical Resource in OnionShare

  • Posted inLOW
  • Posted byGitHub
  • 01/22/202210/26/2022

Between September 26, 2021 and October 8, 2021, Radically Open Security conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund’s Red Team lab. This is an issue from that penetration test.

Vulnerability ID: OTF-006
Vulnerabi…

[onionshare-cli] Improper Access Control in Onionshare

  • Posted inMODERATE
  • Posted byGitHub
  • 01/22/202210/26/2022

Between September 26, 2021 and October 8, 2021, Radically Open Security conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund’s Red Team lab. This is an issue from that penetration test.

Vulnerability ID: OTF-009
Vulnerabi…

[onionshare-cli] Username spoofing in OnionShare

  • Posted inMODERATE
  • Posted byGitHub
  • 01/22/202210/26/2022

Between September 26, 2021 and October 8, 2021, Radically Open Security conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund’s Red Team lab. This is an issue from that penetration test.

Vulnerability ID: OTF-005
Vulnerabi…

[log4j:log4j] Deserialization of Untrusted Data in Apache Log4j

  • Posted inCRITICAL
  • Posted byGitHub
  • 01/19/202211/26/2022

CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j 1.2.x where the same issue exists.
Users are advised to migrate from log4j:log4j to org.apache.logging…

[org.jenkins-ci.plugins:credentials] Incorrect Permission Assignment for Critical Resource in Jenkins Credentials Binding Plugin

  • Posted inMODERATE
  • Posted byGitHub
  • 01/13/202211/30/2022

Jenkins Credentials Binding Plugin 1.27 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read access to validate if a credential ID refers to a secret file credential and whether …

[org.jenkins-ci.plugins:active-directory] User passwords transmitted in plain text by Jenkins Active Directory Plugin

  • Posted inMODERATE
  • Posted byGitHub
  • 01/13/202211/30/2022

Jenkins Active Directory Plugin 2.25 and earlier does not encrypt the transmission of data between the Jenkins controller and Active Directory servers in most configurations.
References

https://nvd.nist.gov/vuln/detail/CVE-2022-23105
https://www.jenki…

[org.jenkins-ci.plugins:publish-over-ssh] Stored XSS vulnerability in Jenkins Publish Over SSH Plugin

  • Posted inMODERATE
  • Posted byGitHub
  • 01/13/202211/30/2022

Jenkins Publish Over SSH Plugin 1.22 and earlier does not escape the SSH server name, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission.
References

https://nvd.nist.gov/vuln/deta…

[com.datapipe.jenkins.plugins:hashicorp-vault-plugin] Improper credentials masking in Jenkins HashiCorp Vault Plugin

  • Posted inMODERATE
  • Posted byGitHub
  • 01/13/202211/30/2022

Jenkins HashiCorp Vault Plugin 3.7.0 and earlier does not mask Vault credentials in Pipeline build logs or in Pipeline step descriptions when Pipeline: Groovy Plugin 2.85 or later is installed.
References

https://nvd.nist.gov/vuln/detail/CVE-2022-2310…

[org.conjur.jenkins:conjur-credentials] Agent-to-controller security bypass in Jenkins Conjur Secrets Plugin allows retrieving all credentials

  • Posted inMODERATE
  • Posted byGitHub
  • 01/13/202211/30/2022

Jenkins Conjur Secrets Plugin 1.0.9 and earlier implements functionality that allows attackers able to control agent processes to retrieve all username/password credentials stored on the Jenkins controller.
References

https://nvd.nist.gov/vuln/detail/…

[org.jenkins-ci.plugins:publish-over-ssh] Path traversal vulnerability in Jenkins Publish Over SSH Plugin

  • Posted inMODERATE
  • Posted byGitHub
  • 01/13/202211/30/2022

Jenkins Publish Over SSH Plugin 1.22 and earlier performs a validation of the file name specifying whether it is present or not, resulting in a path traversal vulnerability allowing attackers with Item/Configure permission to discover the name of the J…

Posts navigation

Previous Posts 1 … 105 106 107 108 109 … 115 Next Posts
トピトピニュース
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close