Lucene search

K
JenkinsGitlab

5 matches found

CVE
CVE
added 2022/06/30 6:15 p.m.279 views

CVE-2022-34777

Jenkins GitLab Plugin 1.5.34 and earlier does not escape multiple fields inserted into the description of webhook-triggered builds, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

5.4CVSS5.3AI score0.30461EPSS
CVE
CVE
added 2022/05/17 3:15 p.m.125 views

CVE-2022-30955

Jenkins GitLab Plugin 1.5.31 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

6.5CVSS6.3AI score0.00806EPSS
CVE
CVE
added 2022/10/19 4:15 p.m.70 views

CVE-2022-43411

Jenkins GitLab Plugin 1.5.35 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token.

5.3CVSS5AI score0.00136EPSS
CVE
CVE
added 2019/04/18 5:29 p.m.56 views

CVE-2019-10300

A cross-site request forgery vulnerability in Jenkins GitLab Plugin 1.5.11 and earlier in the GitLabConnectionConfig#doTestConnection form validation method allowed attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing ...

8CVSS7.5AI score0.00089EPSS
CVE
CVE
added 2019/04/18 5:29 p.m.40 views

CVE-2019-10301

A missing permission check in Jenkins GitLab Plugin 1.5.11 and earlier in the GitLabConnectionConfig#doTestConnection form validation method allowed attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another metho...

8.8CVSS8.4AI score0.00067EPSS