Lucene search

K

Continuous Integration With Toad Edge Security Vulnerabilities

cve
cve

CVE-2022-28145

Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier does not apply Content-Security-Policy headers to report files it serves, resulting in a stored cross-site scripting (XSS) exploitable by attackers with Item/Configure permission or otherwise able to control report contents.

5.4CVSS

5.1AI Score

0.001EPSS

2022-03-29 01:15 PM
111
cve
cve

CVE-2022-28146

Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier allows attackers with Item/Configure permission to read arbitrary files on the Jenkins controller by specifying an input folder on the Jenkins controller as a parameter to its build steps.

6.5CVSS

6.2AI Score

0.001EPSS

2022-03-29 01:15 PM
82
cve
cve

CVE-2022-28147

A missing permission check in Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier allows attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.

4.3CVSS

4.3AI Score

0.001EPSS

2022-03-29 01:15 PM
82
cve
cve

CVE-2022-28148

The file browser in Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier may interpret some paths to files as absolute on Windows, resulting in a path traversal vulnerability allowing attackers with Item/Read permission to obtain the contents of arbitrary files on Windows controller...

6.5CVSS

6.2AI Score

0.001EPSS

2022-03-29 01:15 PM
76