Show filters
20 Total Results
Displaying 11-20 of 20
Sort by:
Attacker Value
Unknown

CVE-2021-21648

Disclosure Date: May 11, 2021 (last updated February 22, 2025)
Jenkins Credentials Plugin 2.3.18 and earlier does not escape user-controlled information on a view it provides, resulting in a reflected cross-site scripting (XSS) vulnerability.
Attacker Value
Unknown

CVE-2021-21625

Disclosure Date: March 18, 2021 (last updated February 22, 2025)
Jenkins CloudBees AWS Credentials Plugin 1.28 and earlier does not perform a permission check in a helper method for HTTP endpoints, allowing attackers with Overall/Read permission to enumerate credentials IDs of AWS credentials stored in Jenkins in some circumstances.
Attacker Value
Unknown

CVE-2020-2182

Disclosure Date: May 06, 2020 (last updated February 21, 2025)
Jenkins Credentials Binding Plugin 1.22 and earlier does not mask (i.e., replace with asterisks) secrets containing a `$` character in some circumstances.
Attacker Value
Unknown

CVE-2020-2181

Disclosure Date: May 06, 2020 (last updated February 21, 2025)
Jenkins Credentials Binding Plugin 1.22 and earlier does not mask (i.e., replace with asterisks) secrets in the build log when the build contains no build steps.
Attacker Value
Unknown

CVE-2019-10436

Disclosure Date: October 16, 2019 (last updated October 26, 2023)
An arbitrary file read vulnerability in Jenkins Google OAuth Credentials Plugin 0.9 and earlier allowed attackers able to configure jobs and credentials in Jenkins to obtain the contents of any file on the Jenkins master.
Attacker Value
Unknown

CVE-2019-1010241

Disclosure Date: July 19, 2019 (last updated November 27, 2024)
Jenkins Credentials Binding Plugin Jenkins 1.17 is affected by: CWE-257: Storing Passwords in a Recoverable Format. The impact is: Authenticated users can recover credentials. The component is: config-variables.jelly line #30 (passwordVariable). The attack vector is: Attacker creates and executes a Jenkins job.
Attacker Value
Unknown

CVE-2019-10320

Disclosure Date: May 21, 2019 (last updated October 26, 2023)
Jenkins Credentials Plugin 2.1.18 and earlier allowed users with permission to create or update credentials to confirm the existence of files on the Jenkins master with an attacker-specified path, and obtain the certificate content of files containing a PKCS#12 certificate.
0
Attacker Value
Unknown

CVE-2019-10303

Disclosure Date: April 18, 2019 (last updated October 26, 2023)
Jenkins Azure PublisherSettings Credentials Plugin 1.2 and earlier stored credentials unencrypted in the credentials.xml file on the Jenkins master where they could be viewed by users with access to the master file system.
Attacker Value
Unknown

CVE-2018-1000601

Disclosure Date: June 26, 2018 (last updated November 26, 2024)
A arbitrary file read vulnerability exists in Jenkins SSH Credentials Plugin 1.13 and earlier in BasicSSHUserPrivateKey.java that allows attackers with a Jenkins account and the permission to configure credential bindings to read arbitrary files from the Jenkins master file system.
0
Attacker Value
Unknown

CVE-2018-1000057

Disclosure Date: February 09, 2018 (last updated November 26, 2024)
Jenkins Credentials Binding Plugin 1.14 and earlier masks passwords it provides to build processes in their build logs. Jenkins however transforms provided password values, e.g. replacing environment variable references, which could result in values different from but similar to configured passwords being provided to the build. Those values are not subject to masking, and could allow unauthorized users to recover the original password.
0