Vulnerabilities (CVE)

Filtered by CWE-862
Total 2641 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-36914 1 Jenkins 1 Files Found Trigger 2023-11-22 N/A 4.3 MEDIUM
Jenkins Files Found Trigger Plugin 1.5 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
CVE-2021-21676 1 Jenkins 1 Requests 2023-11-22 4.0 MEDIUM 4.3 MEDIUM
Jenkins requests-plugin Plugin 2.2.7 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to send test emails to an attacker-specified email address.
CVE-2022-36883 1 Jenkins 1 Git 2023-11-22 N/A 7.5 HIGH
A missing permission check in Jenkins Git Plugin 4.11.3 and earlier allows unauthenticated attackers to trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit.
CVE-2022-36888 1 Jenkins 1 Hashicorp Vault 2023-11-22 N/A 6.5 MEDIUM
A missing permission check in Jenkins HashiCorp Vault Plugin 354.vdb_858fd6b_f48 and earlier allows attackers with Overall/Read permission to obtain credentials stored in Vault with attacker-specified path and keys.
CVE-2022-36891 1 Jenkins 1 Deployer Framework 2023-11-22 N/A 4.3 MEDIUM
A missing permission check in Jenkins Deployer Framework Plugin 85.v1d1888e8c021 and earlier allows attackers with Item/Read permission but without Deploy Now/Deploy permission to read deployment logs.
CVE-2022-36892 1 Jenkins 1 Rhnpush-plugin 2023-11-22 N/A 4.3 MEDIUM
Jenkins rhnpush-plugin Plugin 0.5.1 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Item/Read permission but without Item/Workspace or Item/Configure permission to check whether attacker-specified file patterns match workspace contents.
CVE-2022-36893 1 Jenkins 1 Rpmsign-plugin 2023-11-22 N/A 4.3 MEDIUM
Jenkins rpmsign-plugin Plugin 0.5.0 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Item/Read permission but without Item/Workspace or Item/Configure permission to check whether attacker-specified file patterns match workspace contents.
CVE-2022-36910 1 Jenkins 1 Lucene-search 2023-11-22 N/A 5.4 MEDIUM
Jenkins Lucene-Search Plugin 370.v62a5f618cd3a and earlier does not perform a permission check in several HTTP endpoints, allowing attackers with Overall/Read permission to reindex the database and to obtain information about jobs otherwise inaccessible to them.
CVE-2022-34798 1 Jenkins 1 Deployment Dashboard 2023-11-22 3.5 LOW 4.3 MEDIUM
Jenkins Deployment Dashboard Plugin 1.0.10 and earlier does not perform a permission check in several HTTP endpoints, allowing attackers with Overall/Read permission to connect to an attacker-specified HTTP URL using attacker-specified credentials.
CVE-2022-34810 1 Jenkins 1 Rqm 2023-11-22 4.0 MEDIUM 6.5 MEDIUM
A missing check in Jenkins RQM Plugin 2.8 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
CVE-2022-34811 1 Jenkins 1 Xpath Configuration Viewer 2023-11-22 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins XPath Configuration Viewer Plugin 1.1.1 and earlier allows attackers with Overall/Read permission to access the XPath Configuration Viewer page.
CVE-2022-34813 1 Jenkins 1 Xpath Configuration Viewer 2023-11-22 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins XPath Configuration Viewer Plugin 1.1.1 and earlier allows attackers with Overall/Read permission to create and delete XPath expressions.
CVE-2022-34818 1 Jenkins 1 Failed Job Deactivator 2023-11-22 4.0 MEDIUM 4.3 MEDIUM
Jenkins Failed Job Deactivator Plugin 1.2.1 and earlier does not perform permission checks in several views and HTTP endpoints, allowing attackers with Overall/Read permission to disable jobs.
CVE-2022-34796 1 Jenkins 1 Deployment Dashboard 2023-11-22 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins Deployment Dashboard Plugin 1.0.10 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
CVE-2022-43431 1 Jenkins 1 Compuware Strobe Measurement 2023-11-22 N/A 4.3 MEDIUM
Jenkins Compuware Strobe Measurement Plugin 1.0.1 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
CVE-2023-30586 1 Nodejs 1 Node.js 2023-11-17 N/A 7.5 HIGH
A privilege escalation vulnerability exists in Node.js 20 that allowed loading arbitrary OpenSSL engines when the experimental permission model is enabled, which can bypass and/or disable the permission model. The attack complexity is high. However, the crypto.setEngine() API can be used to bypass the permission model when called with a compatible OpenSSL engine. The OpenSSL engine can, for example, disable the permission model in the host process by manipulating the process's stack memory to locate the permission model Permission::enabled_ in the host process's heap memory. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
CVE-2022-28139 1 Jenkins 1 Rocketchat Notifier 2023-11-17 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins RocketChat Notifier Plugin 1.4.10 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.
CVE-2022-28147 1 Jenkins 1 Continuous Integration With Toad Edge 2023-11-17 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier allows attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
CVE-2022-28144 1 Jenkins 1 Proxmox 2023-11-17 4.0 MEDIUM 6.5 MEDIUM
Jenkins Proxmox Plugin 0.7.0 and earlier does not perform a permission check in several HTTP endpoints, allowing attackers with Overall/Read permission to connect to an attacker-specified host using attacker-specified username and password (perform a connection test), disable SSL/TLS validation for the entire Jenkins controller JVM as part of the connection test (see CVE-2022-28142), and test a rollback with attacker-specified parameters.
CVE-2023-6001 1 Yugabyte 1 Yugabytedb 2023-11-16 N/A 7.5 HIGH
Prometheus metrics are available without authentication. These expose detailed and sensitive information about the YugabyteDB Anywhere environment.