Home
Bugtraq
Full List
Only Bugs
Only Tricks
Only Exploits
Only Dorks
Only CVE
Only CWE
Fake Notes
Ranking
CVEMAP
Full List
Show Vendors
Show Products
CWE Dictionary
Check CVE Id
Check CWE Id
Search
Bugtraq
CVEMAP
By author
CVE Id
CWE Id
By vendors
By products
RSS
Bugtraq
CVEMAP
CVE Products
Bugs
Exploits
Dorks
More
cIFrex
Facebook
Twitter
Donate
About
Submit
Vulnerabilities for
'Subversion'
2022-04-12
CVE-2022-29046
CWE-79
Jenkins Subversion Plugin 2.15.3 and earlier does not escape the name and description of List Subversion tags (and more) parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
CVE-2022-29048
CWE-352
A cross-site request forgery (CSRF) vulnerability in Jenkins Subversion Plugin 2.15.3 and earlier allows attackers to connect to an attacker-specified URL.
2021-11-04
CVE-2021-21698
CWE-22
Jenkins Subversion Plugin 2.15.0 and earlier does not restrict the name of a file when looking up a subversion key file on the controller from an agent.
2020-11-04
CVE-2020-2304
CWE-611
Jenkins Subversion Plugin 2.13.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
2020-02-12
CVE-2020-2111
CWE-79
Jenkins Subversion Plugin 2.13.0 and earlier does not escape the error message for the Project Repository Base URL field form validation, resulting in a stored cross-site scripting vulnerability.
2018-03-13
CVE-2018-1000111
CWE-863
An improper authorization vulnerability exists in Jenkins Subversion Plugin version 2.10.2 and earlier in SubversionStatus.java and SubversionRepositoryStatus.java that allows an attacker with network access to obtain a list of nodes and users.
2017-10-04
CVE-2017-1000085
Subversion Plugin connects to a user-specified Subversion repository as part of form validation (e.g. to retrieve a list of tags). This functionality improperly checked permissions, allowing any user with Item/Build permission (but not Item/Configure) to connect to any web server or Subversion server and send credentials with a known ID, thereby possibly capturing them. Additionally, this functionality did not require POST requests be used, thereby allowing the above to be performed without direct access to Jenkins via Cross-Site Request Forgery attacks.
>>>
Vendor:
Jenkins
480
Products
Jenkins
Tap plugin
Image gallery plugin
Extra columns plugin
Script security
Pipeline
Poll scm
Docker commons
Github branch source
GIT
Blue ocean
Datadog
Config file provider
Owasp dependency-check
Pipeline-input-step
Deploy to container
DRY
Static analysis utilities
Periodic backup
Sidebar link
Role-based authorization strategy
Parameterized trigger
Subversion
Git client
Favorite plugin
SSH
PMD
Checkstyle
Findbugs
Warnings
Release
Translation assistance
Maven
Swarm
Pipeline nodes and processes
Delivery pipeline
Build-publisher
Dependency graph viewer
Multijob
Global-build-stats
EC2
Active choices
Speaks!
CCM
Android lint
Junit
Credentials binding
Pipeline supporting apis
Gerrit trigger
Cppncss
Google-play-android-publisher
Mercurial
Testlink
Promoted builds
Job and node ownership
Coverity
Mailer
Cucumber living documentation
Github pull request builder
Reverse proxy auth
Vsphere
Liquibase runner
Copy to slave
Ansible
Google login
Html publisher
Email extension
S3 publisher
Github
Kubernetes
CAS
Absint astree
Black duck hub
Black duck detect
Gitlab hook
Groovy postbuild
Ssh credentials
SAML
Openstack cloud
Badge
Urltrigger
Fortify cloudscan
Z/os connector
Configuration as code
Collabnet
Aws codepipeline
Aws codedeploy
Aws codebuild
Active directory
Distributed fork
Pipeline classpath step
Accurev
Shelve project
Meliora testlab
Ssh agent
Tinfoil security
Inedo proget
Tracetronic ecu-test
Inedo buildmaster
Maven artifact choicelistprovider (nexus)
See all Products for Vendor
Jenkins
Copyright
2024
, cxsecurity.com
Back to Top