All the vulnerabilites related to Jenkins project - Jenkins Lockable Resources Plugin
cve-2019-1003042
Vulnerability from cvelistv5
Published
2019-03-28 17:59
Modified
2024-08-05 03:07
Severity ?
EPSS score ?
Summary
A cross site scripting vulnerability in Jenkins Lockable Resources Plugin 2.4 and earlier allows attackers able to control resource names to inject arbitrary JavaScript in web pages rendered by the plugin.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2019/03/28/2 | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/107628 | vdb-entry, x_refsource_BID | |
https://access.redhat.com/errata/RHSA-2019:1423 | vendor-advisory, x_refsource_REDHAT | |
https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1361 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
Jenkins project | Jenkins Lockable Resources Plugin |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:07:16.802Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20190328 Re: Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/03/28/2" }, { "name": "107628", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107628" }, { "name": "RHSA-2019:1423", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:1423" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1361" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Jenkins Lockable Resources Plugin", "vendor": "Jenkins project", "versions": [ { "status": "affected", "version": "2.4 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "A cross site scripting vulnerability in Jenkins Lockable Resources Plugin 2.4 and earlier allows attackers able to control resource names to inject arbitrary JavaScript in web pages rendered by the plugin." } ], "providerMetadata": { "dateUpdated": "2023-10-24T16:45:19.638Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "name": "[oss-security] 20190328 Re: Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/03/28/2" }, { "name": "107628", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107628" }, { "name": "RHSA-2019:1423", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:1423" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1361" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "jenkinsci-cert@googlegroups.com", "ID": "CVE-2019-1003042", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Jenkins Lockable Resources Plugin", "version": { "version_data": [ { "version_value": "2.4 and earlier" } ] } } ] }, "vendor_name": "Jenkins project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A cross site scripting vulnerability in Jenkins Lockable Resources Plugin 2.4 and earlier allows attackers able to control resource names to inject arbitrary JavaScript in web pages rendered by the plugin." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20190328 Re: Multiple vulnerabilities in Jenkins plugins", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/03/28/2" }, { "name": "107628", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107628" }, { "name": "RHSA-2019:1423", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:1423" }, { "name": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1361", "refsource": "CONFIRM", "url": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1361" } ] } } } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2019-1003042", "datePublished": "2019-03-28T17:59:29", "dateReserved": "2019-03-28T00:00:00", "dateUpdated": "2024-08-05T03:07:16.802Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-2281
Vulnerability from cvelistv5
Published
2020-09-23 13:10
Modified
2024-08-04 07:01
Severity ?
EPSS score ?
Summary
A cross-site request forgery (CSRF) vulnerability in Jenkins Lockable Resources Plugin 2.8 and earlier allows attackers to reserve, unreserve, unlock, and reset resources.
References
▼ | URL | Tags |
---|---|---|
https://www.jenkins.io/security/advisory/2020-09-23/#SECURITY-1958 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2020/09/23/1 | mailing-list, x_refsource_MLIST |
Impacted products
▼ | Vendor | Product |
---|---|---|
Jenkins project | Jenkins Lockable Resources Plugin |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:01:41.296Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.jenkins.io/security/advisory/2020-09-23/#SECURITY-1958" }, { "name": "[oss-security] 20200923 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2020/09/23/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Jenkins Lockable Resources Plugin", "vendor": "Jenkins project", "versions": [ { "lessThanOrEqual": "2.8", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A cross-site request forgery (CSRF) vulnerability in Jenkins Lockable Resources Plugin 2.8 and earlier allows attackers to reserve, unreserve, unlock, and reset resources." } ], "providerMetadata": { "dateUpdated": "2023-10-24T16:08:28.221Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.jenkins.io/security/advisory/2020-09-23/#SECURITY-1958" }, { "name": "[oss-security] 20200923 Multiple vulnerabilities in Jenkins plugins", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2020/09/23/1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "jenkinsci-cert@googlegroups.com", "ID": "CVE-2020-2281", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Jenkins Lockable Resources Plugin", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "2.8" } ] } } ] }, "vendor_name": "Jenkins project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A cross-site request forgery (CSRF) vulnerability in Jenkins Lockable Resources Plugin 2.8 and earlier allows attackers to reserve, unreserve, unlock, and reset resources." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-352: Cross-Site Request Forgery (CSRF)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.jenkins.io/security/advisory/2020-09-23/#SECURITY-1958", "refsource": "CONFIRM", "url": "https://www.jenkins.io/security/advisory/2020-09-23/#SECURITY-1958" }, { "name": "[oss-security] 20200923 Multiple vulnerabilities in Jenkins plugins", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2020/09/23/1" } ] } } } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2020-2281", "datePublished": "2020-09-23T13:10:18", "dateReserved": "2019-12-05T00:00:00", "dateUpdated": "2024-08-04T07:01:41.296Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }