Home
Bugtraq
Full List
Only Bugs
Only Tricks
Only Exploits
Only Dorks
Only CVE
Only CWE
Fake Notes
Ranking
CVEMAP
Full List
Show Vendors
Show Products
CWE Dictionary
Check CVE Id
Check CWE Id
Search
Bugtraq
CVEMAP
By author
CVE Id
CWE Id
By vendors
By products
RSS
Bugtraq
CVEMAP
CVE Products
Bugs
Exploits
Dorks
More
cIFrex
Facebook
Twitter
Donate
About
Submit
Vulnerabilities for
'Storage configs'
2022-05-17
CVE-2022-30972
CWE-352
A cross-site request forgery (CSRF) vulnerability in Jenkins Storable Configs Plugin 1.0 and earlier allows attackers to have Jenkins parse a local XML file (e.g., archived artifacts) that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
>>>
Vendor:
Jenkins
480
Products
SSH
CVS
Bugzilla
Mantis
Metrics
Database
Jabber server
Subversion
GIT
JIRA
Openid
Testlink
Mercurial
Recipe
Valgrind
Splunk
Jenkins
Vsphere
Sametime
Maven
Active directory
Pluggable authentication module
Mongodb
Ansible
Build failure analyzer
Gitlab
Kanboard
Docker
Logstash
Requests
Weibo
GOGS
Perfecto
Groovy
Accurev
Twitter
Vrealize orchestrator
Kubernetes
Openstack cloud
Cloud foundry
Tap plugin
Image gallery plugin
Extra columns plugin
Script security
Pipeline
Poll scm
Docker commons
Github branch source
Blue ocean
Datadog
Config file provider
Owasp dependency-check
KOJI
Pipeline-input-step
Deploy to container
DRY
Static analysis utilities
Periodic backup
Sidebar link
Role-based authorization strategy
Parameterized trigger
Play framework
Git client
Favorite plugin
PMD
Checkstyle
Findbugs
Warnings
Release
Translation assistance
Swarm
Pipeline nodes and processes
Delivery pipeline
Build-publisher
Dependency graph viewer
Multijob
Global-build-stats
EC2
Active choices
Speaks!
CCM
Android lint
Junit
Credentials binding
Pipeline supporting apis
Monitoring
Gerrit trigger
Cppncss
Google-play-android-publisher
Promoted builds
Job and node ownership
Coverity
Mailer
Cucumber living documentation
Github pull request builder
Perforce
Reverse proxy auth
Liquibase runner
Copy to slave
Google login
See all Products for Vendor
Jenkins
Copyright
2024
, cxsecurity.com
Back to Top