RSS   Vulnerabilities for 'Config file provider'   RSS

2021-04-21
 
CVE-2021-21645

CWE-862
 

 
Jenkins Config File Provider Plugin 3.7.0 and earlier does not perform permission checks in several HTTP endpoints, attackers with Overall/Read permission to enumerate configuration file IDs.

 
 
CVE-2021-21644

CWE-352
 

 
A cross-site request forgery (CSRF) vulnerability in Jenkins Config File Provider Plugin 3.7.0 and earlier allows attackers to delete configuration files corresponding to an attacker-specified ID.

 
 
CVE-2021-21643

CWE-863
 

 
Jenkins Config File Provider Plugin 3.7.0 and earlier does not correctly perform permission checks in several HTTP endpoints, allowing attackers with global Job/Configure permission to enumerate system-scoped credentials IDs of credentials stored in Jenkins.

 
 
CVE-2021-21642

CWE-611
 

 
Jenkins Config File Provider Plugin 3.7.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

 
2019-02-06
 
CVE-2019-1003014

CWE-79
 

 
An cross-site scripting vulnerability exists in Jenkins Config File Provider Plugin 3.4.1 and earlier in src/main/resources/lib/configfiles/configfiles.jelly that allows attackers with permission to define shared configuration files to execute arbitrary JavaScript when a user attempts to delete the shared configuration file.

 
2019-01-09
 
CVE-2018-1000414

CWE-352
 

 
A cross-site request forgery vulnerability exists in Jenkins Config File Provider Plugin 3.1 and earlier in ConfigFilesManagement.java, FolderConfigFileAction.java that allows creating and editing configuration file definitions.

 
2017-10-04
 
CVE-2017-1000104

CWE-269
 

 
The Config File Provider Plugin is used to centrally manage configuration files that often include secrets, such as passwords. Users with only Overall/Read access to Jenkins were able to access URLs directly that allowed viewing these files. Access to view these files now requires sufficient permissions to configure the provided files, view the configuration of the folder in which the configuration files are defined, or have Job/Configure permissions to a job able to use these files.

 

 >>> Vendor: Jenkins 480 Products
SSH
CVS
Bugzilla
Mantis
Metrics
Database
Jabber server
Subversion
GIT
JIRA
Openid
Testlink
Mercurial
Recipe
Valgrind
Splunk
Jenkins
Vsphere
Sametime
Maven
Active directory
Pluggable authentication module
Mongodb
Ansible
Build failure analyzer
Gitlab
Kanboard
Docker
Logstash
Requests
Weibo
GOGS
Perfecto
Groovy
Accurev
Twitter
Vrealize orchestrator
Kubernetes
Openstack cloud
Cloud foundry
Tap plugin
Image gallery plugin
Extra columns plugin
Script security
Pipeline
Poll scm
Docker commons
Github branch source
Blue ocean
Datadog
Config file provider
Owasp dependency-check
KOJI
Pipeline-input-step
Deploy to container
DRY
Static analysis utilities
Periodic backup
Sidebar link
Role-based authorization strategy
Parameterized trigger
Play framework
Git client
Favorite plugin
PMD
Checkstyle
Findbugs
Warnings
Release
Translation assistance
Swarm
Pipeline nodes and processes
Delivery pipeline
Build-publisher
Dependency graph viewer
Multijob
Global-build-stats
EC2
Active choices
Speaks!
CCM
Android lint
Junit
Credentials binding
Pipeline supporting apis
Monitoring
Gerrit trigger
Cppncss
Google-play-android-publisher
Promoted builds
Job and node ownership
Coverity
Mailer
Cucumber living documentation
Github pull request builder
Perforce
Reverse proxy auth
Liquibase runner
Copy to slave
Google login
See all Products for Vendor Jenkins


Copyright 2024, cxsecurity.com

 

Back to Top