Skip to content

トピトピニュース

Header Image
Category

CRITICAL

187 Posts

Featured

Posted byGitHub
[github.com/crewjam/saml] crewjam/saml vulnerable to signature bypass via multiple Assertion elements due to improper authentication
Posted byGitHub
[org.jeecgframework.boot:jeecg-boot-common] Jeecg-boot vulnerable to SQL Injection
Posted byGitHub
[electron] Heap buffer overflow in GPU
Posted byGitHub
[wger] wger vulnerable to brute force attempts

[io.jenkins.plugin-management:plugin-management-parent-pom] Download of Code Without Integrity Check in Jenkins Plugin Installation Manager

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/25/202209/08/2022

Jenkins Plugin Installation Manager Tool 2.1.3 and earlier does not verify plugin downloads.
References

https://nvd.nist.gov/vuln/detail/CVE-2020-2320
https://www.jenkins.io/security/advisory/2020-12-03/#SECURITY-1856
http://www.openwall.com/lists/oss…

[org.jenkins-ci.plugins:active-directory] Improper Authentication in Jenkins Active Directory Plugin

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/25/202209/08/2022

Jenkins Active Directory Plugin 2.19 and earlier allows attackers to log in as any user if a magic constant is used as the password.
References

https://nvd.nist.gov/vuln/detail/CVE-2020-2299
https://www.jenkins.io/security/advisory/2020-11-04/#SECURIT…

[org.jenkins-ci.plugins:active-directory] Improper Authentication (empty password) in Jenkins Active Directory Plugin

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/25/202209/08/2022

Jenkins Active Directory Plugin prior to 2.20 does not prohibit the use of an empty password in Windows/ADSI mode, which allows attackers to log in to Jenkins as any user depending on the configuration of the Active Directory server.
References

https:…

[org.jenkins-ci.plugins:active-directory] Authentication cache in Active Directory Jenkins Plugin allows logging in with any password

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/25/202209/09/2022

Jenkins Active Directory Plugin 2.19 and earlier allows attackers to log in as any user with any password while a successful authentication of that user is still in the optional cache when using Windows/ADSI mode.
References

https://nvd.nist.gov/vuln/…

[org.jenkins-ci.plugins.workflow:puppet-enterprise-pipeline] Incorrect Authorization in Puppet Enterprise Pipeline Jenkins Plugin

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/25/202209/09/2022

Jenkins Puppet Enterprise Pipeline 1.3.1 and earlier specifies unsafe values in its custom Script Security whitelist, allowing attackers able to execute Script Security protected scripts to execute arbitrary code.
References

https://nvd.nist.gov/vuln/…

[io.fabric8.pipeline:kubernetes-pipeline-steps] Incorrect Authorization in Jenkins Kubernetes :: Pipeline :: Kubernetes Steps Plugin

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/25/202209/09/2022

Jenkins Kubernetes :: Pipeline :: Kubernetes Steps Plugin provides a custom whitelist for script security that allowed attackers to invoke arbitrary methods, bypassing typical sandbox protection.
References

https://nvd.nist.gov/vuln/detail/CVE-2019-10…

[io.fabric8.pipeline:kubernetes-pipeline-arquillian-steps] Incorrect Authorization in Jenkins Kubernetes :: Pipeline :: Arquillian Steps Plugin

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/25/202209/09/2022

Jenkins Kubernetes :: Pipeline :: Arquillian Steps Plugin provides a custom whitelist for script security that allowed attackers to invoke arbitrary methods, bypassing typical sandbox protection.
References

https://nvd.nist.gov/vuln/detail/CVE-2019-10…

[org.jenkins-ci.plugins:ontrack] Sandbox bypass in ontrack Jenkins Plugin

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/25/202209/09/2022

A sandbox bypass vulnerability in Jenkins ontrack Plugin 3.4 and earlier allowed attackers with control over ontrack DSL definitions to execute arbitrary code on the Jenkins master JVM.
References

https://nvd.nist.gov/vuln/detail/CVE-2019-10306
https:…

[DotNetCasClient] Jasig Java CAS Client, .NET CAS Client, and phpCAS contain URL parameter injection vulnerability

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/18/202211/23/2022

A URL parameter injection vulnerability was found in the back-channel ticket validation step of the CAS protocol in Jasig Java CAS Client before 3.3.2, .NET CAS Client before 1.0.2, and phpCAS before 1.3.3 that allow remote attackers to inject arbitrar…

[org.apache.struts:struts2-core] Remote Code Execution in Apache Struts

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/17/202211/04/2022

XSLTResult allows for the location of a stylesheet being passed as a request parameter. In some circumstances this can be used to inject remotely executable code.
References

https://nvd.nist.gov/vuln/detail/CVE-2016-3082
http://struts.apache.org/docs/…

Posts navigation

Previous Posts 1 … 12 13 14 15 16 … 19 Next Posts
トピトピニュース
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close