Show filters
65 Total Results
Displaying 61-65 of 65
Sort by:
Attacker Value
Unknown

CVE-2018-1000143

Disclosure Date: April 05, 2018 (last updated November 26, 2024)
An exposure of sensitive information vulnerability exists in Jenkins GitHub Pull Request Builder Plugin version 1.39.0 and older in GhprbCause.java that allows an attacker with local file system access to obtain GitHub credentials.
0
Attacker Value
Unknown

CVE-2018-1000142

Disclosure Date: April 05, 2018 (last updated November 26, 2024)
An exposure of sensitive information vulnerability exists in Jenkins GitHub Pull Request Builder Plugin version 1.39.0 and older in GhprbCause.java that allows an attacker with local file system access to obtain GitHub credentials.
0
Attacker Value
Unknown

CVE-2017-1000087

Disclosure Date: October 05, 2017 (last updated November 26, 2024)
GitHub Branch Source provides a list of applicable credential IDs to allow users configuring a job to select the one they'd like to use. This functionality did not check permissions, allowing any user with Overall/Read permission to get a list of valid credentials IDs. Those could be used as part of an attack to capture the credentials using another vulnerability.
0
Attacker Value
Unknown

CVE-2017-1000091

Disclosure Date: October 05, 2017 (last updated November 26, 2024)
GitHub Branch Source Plugin connects to a user-specified GitHub API URL (e.g. GitHub Enterprise) as part of form validation and completion (e.g. to verify Scan Credentials are correct). This functionality improperly checked permissions, allowing any user with Overall/Read access to Jenkins to connect to any web server and send credentials with a known ID, thereby possibly capturing them. Additionally, this functionality did not require POST requests be used, thereby allowing the above to be performed without direct access to Jenkins via Cross-Site Request Forgery.
0
Attacker Value
Unknown

CVE-2012-2055

Disclosure Date: April 05, 2012 (last updated January 21, 2024)
GitHub Enterprise before 20120304 does not properly restrict the use of a hash to provide values for a model's attributes, which allows remote attackers to set the public_key[user_id] value via a modified URL for the public-key update form, related to a "mass assignment" vulnerability.