Show filters
35 Total Results
Displaying 21-30 of 35
Sort by:
Attacker Value
Unknown
CVE-2020-2164
Disclosure Date: March 25, 2020 (last updated February 21, 2025)
Jenkins Artifactory Plugin 3.5.0 and earlier stores its Artifactory server password unencrypted in its global configuration file on the Jenkins master where it can be viewed by users with access to the master file system.
0
Attacker Value
Unknown
CVE-2020-2165
Disclosure Date: March 25, 2020 (last updated February 21, 2025)
Jenkins Artifactory Plugin 3.6.0 and earlier transmits configured passwords in plain text as part of its global Jenkins configuration form, potentially resulting in their exposure.
0
Attacker Value
Unknown
CVE-2019-19937
Disclosure Date: March 16, 2020 (last updated February 21, 2025)
In JFrog Artifactory before 6.18, it is not possible to restrict either system or repository imports by any admin user in the enterprise, which can lead to "undesirable results."
0
Attacker Value
Unknown
CVE-2020-7931
Disclosure Date: January 23, 2020 (last updated November 27, 2024)
In JFrog Artifactory 5.x and 6.x, insecure FreeMarker template processing leads to remote code execution, e.g., by modifying a .ssh/authorized_keys file. Patches are available for various versions between 5.11.8 and 6.16.0. The issue exists because use of the DefaultObjectWrapper class makes certain Java functions accessible to a template.
0
Attacker Value
Unknown
CVE-2019-10323
Disclosure Date: May 31, 2019 (last updated October 26, 2023)
A missing permission check in Jenkins Artifactory Plugin 3.2.3 and earlier in various 'fillCredentialsIdItems' methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins.
0
Attacker Value
Unknown
CVE-2019-10321
Disclosure Date: May 31, 2019 (last updated October 26, 2023)
A cross-site request forgery vulnerability in Jenkins Artifactory Plugin 3.2.2 and earlier in ArtifactoryBuilder.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
0
Attacker Value
Unknown
CVE-2019-10322
Disclosure Date: May 31, 2019 (last updated October 26, 2023)
A missing permission check in Jenkins Artifactory Plugin 3.2.2 and earlier in ArtifactoryBuilder.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
0
Attacker Value
Unknown
CVE-2019-10324
Disclosure Date: May 31, 2019 (last updated October 26, 2023)
A cross-site request forgery vulnerability in Jenkins Artifactory Plugin 3.2.2 and earlier in ReleaseAction#doSubmit, GradleReleaseApiAction#doStaging, MavenReleaseApiAction#doStaging, and UnifiedPromoteBuildAction#doSubmit allowed attackers to schedule a release build, perform release staging for Gradle and Maven projects, and promote previously staged builds, respectively.
0
Attacker Value
Unknown
CVE-2018-19971
Disclosure Date: April 16, 2019 (last updated November 27, 2024)
JFrog Artifactory Pro 6.5.9 has Incorrect Access Control.
0
Attacker Value
Unknown
CVE-2019-9733
Disclosure Date: April 11, 2019 (last updated November 27, 2024)
An issue was discovered in JFrog Artifactory 6.7.3. By default, the access-admin account is used to reset the password of the admin account in case an administrator gets locked out from the Artifactory console. This is only allowable from a connection directly from localhost, but providing a X-Forwarded-For HTTP header to the request allows an unauthenticated user to login with the default credentials of the access-admin account while bypassing the whitelist of allowed IP addresses. The access-admin account can use Artifactory's API to request authentication tokens for all users including the admin account and, in turn, assume full control of all artifacts and repositories managed by Artifactory.
0