From c65e45ecb8aa00ee656c9cfad21f165f2114eb7c Mon Sep 17 00:00:00 2001 From: Daniel Beck Date: Tue, 17 Dec 2019 14:56:29 +0100 Subject: [PATCH] Add 2019-12-17 Jenkins security advisory --- 2019/16xxx/CVE-2019-16549.json | 62 ++++++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16550.json | 62 ++++++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16551.json | 62 ++++++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16552.json | 62 ++++++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16553.json | 62 ++++++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16554.json | 62 ++++++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16555.json | 62 ++++++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16556.json | 62 ++++++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16557.json | 62 ++++++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16558.json | 62 ++++++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16559.json | 66 ++++++++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16560.json | 66 ++++++++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16561.json | 66 ++++++++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16562.json | 70 ++++++++++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16563.json | 66 ++++++++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16564.json | 62 ++++++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16565.json | 66 ++++++++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16566.json | 66 ++++++++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16567.json | 66 ++++++++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16568.json | 66 ++++++++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16569.json | 66 ++++++++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16570.json | 66 ++++++++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16571.json | 66 ++++++++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16572.json | 66 ++++++++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16573.json | 66 ++++++++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16574.json | 66 ++++++++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16575.json | 66 ++++++++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16576.json | 66 ++++++++++++++++++++++++++++++++ 28 files changed, 1808 insertions(+) create mode 100644 2019/16xxx/CVE-2019-16549.json create mode 100644 2019/16xxx/CVE-2019-16550.json create mode 100644 2019/16xxx/CVE-2019-16551.json create mode 100644 2019/16xxx/CVE-2019-16552.json create mode 100644 2019/16xxx/CVE-2019-16553.json create mode 100644 2019/16xxx/CVE-2019-16554.json create mode 100644 2019/16xxx/CVE-2019-16555.json create mode 100644 2019/16xxx/CVE-2019-16556.json create mode 100644 2019/16xxx/CVE-2019-16557.json create mode 100644 2019/16xxx/CVE-2019-16558.json create mode 100644 2019/16xxx/CVE-2019-16559.json create mode 100644 2019/16xxx/CVE-2019-16560.json create mode 100644 2019/16xxx/CVE-2019-16561.json create mode 100644 2019/16xxx/CVE-2019-16562.json create mode 100644 2019/16xxx/CVE-2019-16563.json create mode 100644 2019/16xxx/CVE-2019-16564.json create mode 100644 2019/16xxx/CVE-2019-16565.json create mode 100644 2019/16xxx/CVE-2019-16566.json create mode 100644 2019/16xxx/CVE-2019-16567.json create mode 100644 2019/16xxx/CVE-2019-16568.json create mode 100644 2019/16xxx/CVE-2019-16569.json create mode 100644 2019/16xxx/CVE-2019-16570.json create mode 100644 2019/16xxx/CVE-2019-16571.json create mode 100644 2019/16xxx/CVE-2019-16572.json create mode 100644 2019/16xxx/CVE-2019-16573.json create mode 100644 2019/16xxx/CVE-2019-16574.json create mode 100644 2019/16xxx/CVE-2019-16575.json create mode 100644 2019/16xxx/CVE-2019-16576.json diff --git a/2019/16xxx/CVE-2019-16549.json b/2019/16xxx/CVE-2019-16549.json new file mode 100644 index 00000000000..c48f5822e11 --- /dev/null +++ b/2019/16xxx/CVE-2019-16549.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ID": "CVE-2019-16549", + "ASSIGNER": "jenkinsci-cert@googlegroups.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Maven Release Plugin", + "version": { + "version_data": [ + { + "version_value": "0.16.1", + "version_affected": "<=" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Jenkins Maven Release Plugin 0.16.1 and earlier does not configure the XML parser to prevent XML external entity (XXE) attacks, allowing man-in-the-middle attackers to have Jenkins parse crafted XML documents." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-611: Improper Restriction of XML External Entity Reference" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1681", + "url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1681", + "refsource": "CONFIRM" + } + ] + } +} diff --git a/2019/16xxx/CVE-2019-16550.json b/2019/16xxx/CVE-2019-16550.json new file mode 100644 index 00000000000..ac8523c8e82 --- /dev/null +++ b/2019/16xxx/CVE-2019-16550.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ID": "CVE-2019-16550", + "ASSIGNER": "jenkinsci-cert@googlegroups.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Maven Release Plugin", + "version": { + "version_data": [ + { + "version_value": "0.16.1", + "version_affected": "<=" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A cross-site request forgery vulnerability in a connection test form method in Jenkins Maven Release Plugin 0.16.1 and earlier allows attackers to have Jenkins connect to an attacker specified web server and parse XML documents." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-352: Cross-Site Request Forgery (CSRF)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1681", + "url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1681", + "refsource": "CONFIRM" + } + ] + } +} diff --git a/2019/16xxx/CVE-2019-16551.json b/2019/16xxx/CVE-2019-16551.json new file mode 100644 index 00000000000..455b9d6abab --- /dev/null +++ b/2019/16xxx/CVE-2019-16551.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ID": "CVE-2019-16551", + "ASSIGNER": "jenkinsci-cert@googlegroups.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Gerrit Trigger Plugin", + "version": { + "version_data": [ + { + "version_value": "2.30.1", + "version_affected": "<=" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A cross-site request forgery vulnerability in Jenkins Gerrit Trigger Plugin 2.30.1 and earlier allows attackers to connect to an attacker-specified HTTP URL or SSH server using attacker-specified credentials." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-352: Cross-Site Request Forgery (CSRF)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1527", + "url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1527", + "refsource": "CONFIRM" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16552.json b/2019/16xxx/CVE-2019-16552.json new file mode 100644 index 00000000000..7a98ab4efba --- /dev/null +++ b/2019/16xxx/CVE-2019-16552.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ID": "CVE-2019-16552", + "ASSIGNER": "jenkinsci-cert@googlegroups.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Gerrit Trigger Plugin", + "version": { + "version_data": [ + { + "version_value": "2.30.1", + "version_affected": "<=" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A missing permission check in Jenkins Gerrit Trigger Plugin 2.30.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified HTTP URL or SSH server using attacker-specified credentials, or determine the existence of a file with a given path on the Jenkins master." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-285: Improper Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1527", + "url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1527", + "refsource": "CONFIRM" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16553.json b/2019/16xxx/CVE-2019-16553.json new file mode 100644 index 00000000000..bfba91bd211 --- /dev/null +++ b/2019/16xxx/CVE-2019-16553.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ID": "CVE-2019-16553", + "ASSIGNER": "jenkinsci-cert@googlegroups.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Build Failure Analyzer Plugin", + "version": { + "version_data": [ + { + "version_value": "1.24.1", + "version_affected": "<=" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A cross-site request forgery vulnerability in Jenkins Build Failure Analyzer Plugin 1.24.1 and earlier allows attackers to have Jenkins evaluate a computationally expensive regular expression." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-352: Cross-Site Request Forgery (CSRF)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1651", + "url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1651", + "refsource": "CONFIRM" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16554.json b/2019/16xxx/CVE-2019-16554.json new file mode 100644 index 00000000000..8e26fd94830 --- /dev/null +++ b/2019/16xxx/CVE-2019-16554.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ID": "CVE-2019-16554", + "ASSIGNER": "jenkinsci-cert@googlegroups.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Build Failure Analyzer Plugin", + "version": { + "version_data": [ + { + "version_value": "1.24.1", + "version_affected": "<=" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A missing permission check in Jenkins Build Failure Analyzer Plugin 1.24.1 and earlier allows attackers with Overall/Read permission to have Jenkins evaluate a computationally expensive regular expression." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-285: Improper Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1651", + "url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1651", + "refsource": "CONFIRM" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16555.json b/2019/16xxx/CVE-2019-16555.json new file mode 100644 index 00000000000..b01a28805d7 --- /dev/null +++ b/2019/16xxx/CVE-2019-16555.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ID": "CVE-2019-16555", + "ASSIGNER": "jenkinsci-cert@googlegroups.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Build Failure Analyzer Plugin", + "version": { + "version_data": [ + { + "version_value": "1.24.1", + "version_affected": "<=" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A user-supplied regular expression in Jenkins Build Failure Analyzer Plugin 1.24.1 and earlier was processed in a way that wasn't interruptible, allowing attackers to have Jenkins evaluate a regular expression without the ability to interrupt this process." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-400: Uncontrolled Resource Consumption" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1651", + "url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1651", + "refsource": "CONFIRM" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16556.json b/2019/16xxx/CVE-2019-16556.json new file mode 100644 index 00000000000..b8b7c16a3d1 --- /dev/null +++ b/2019/16xxx/CVE-2019-16556.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ID": "CVE-2019-16556", + "ASSIGNER": "jenkinsci-cert@googlegroups.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Rundeck Plugin", + "version": { + "version_data": [ + { + "version_value": "3.6.5", + "version_affected": "<=" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Jenkins Rundeck Plugin 3.6.5 and earlier stores credentials unencrypted in its global configuration file and in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-256: Unprotected Storage of Credentials" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1636", + "url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1636", + "refsource": "CONFIRM" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16557.json b/2019/16xxx/CVE-2019-16557.json new file mode 100644 index 00000000000..9b2fcbf864e --- /dev/null +++ b/2019/16xxx/CVE-2019-16557.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ID": "CVE-2019-16557", + "ASSIGNER": "jenkinsci-cert@googlegroups.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Redgate SQL Change Automation Plugin", + "version": { + "version_data": [ + { + "version_value": "2.0.3", + "version_affected": "<=" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Jenkins Redgate SQL Change Automation Plugin 2.0.3 and earlier stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-256: Unprotected Storage of Credentials" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1598", + "url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1598", + "refsource": "CONFIRM" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16558.json b/2019/16xxx/CVE-2019-16558.json new file mode 100644 index 00000000000..1446b075974 --- /dev/null +++ b/2019/16xxx/CVE-2019-16558.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ID": "CVE-2019-16558", + "ASSIGNER": "jenkinsci-cert@googlegroups.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Spira Importer Plugin", + "version": { + "version_data": [ + { + "version_value": "3.2.3", + "version_affected": "<=" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Jenkins Spira Importer Plugin 3.2.3 and earlier disables SSL/TLS certificate validation for the Jenkins master JVM." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-295: Improper Certificate Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1580", + "url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1580", + "refsource": "CONFIRM" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16559.json b/2019/16xxx/CVE-2019-16559.json new file mode 100644 index 00000000000..5d3f16dd2ad --- /dev/null +++ b/2019/16xxx/CVE-2019-16559.json @@ -0,0 +1,66 @@ +{ + "CVE_data_meta": { + "ID": "CVE-2019-16559", + "ASSIGNER": "jenkinsci-cert@googlegroups.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins WebSphere Deployer Plugin", + "version": { + "version_data": [ + { + "version_value": "1.6.1", + "version_affected": "<=" + }, + { + "version_value": "1.6.1", + "version_affected": "?>" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A missing permission check in Jenkins WebSphere Deployer Plugin 1.6.1 and earlier allows attackers with Overall/Read permission to perform connection tests and determine whether files with an attacker-specified path exist on the Jenkins master file system." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-285: Improper Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1371", + "url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1371", + "refsource": "CONFIRM" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16560.json b/2019/16xxx/CVE-2019-16560.json new file mode 100644 index 00000000000..f8de13ad3d9 --- /dev/null +++ b/2019/16xxx/CVE-2019-16560.json @@ -0,0 +1,66 @@ +{ + "CVE_data_meta": { + "ID": "CVE-2019-16560", + "ASSIGNER": "jenkinsci-cert@googlegroups.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins WebSphere Deployer Plugin", + "version": { + "version_data": [ + { + "version_value": "1.6.1", + "version_affected": "<=" + }, + { + "version_value": "1.6.1", + "version_affected": "?>" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A cross-site request forgery vulnerability in Jenkins WebSphere Deployer Plugin 1.6.1 and earlier allows attackers to perform connection tests and determine whether files with an attacker-specified path exist on the Jenkins master file system." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-352: Cross-Site Request Forgery (CSRF)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1371", + "url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1371", + "refsource": "CONFIRM" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16561.json b/2019/16xxx/CVE-2019-16561.json new file mode 100644 index 00000000000..10423526896 --- /dev/null +++ b/2019/16xxx/CVE-2019-16561.json @@ -0,0 +1,66 @@ +{ + "CVE_data_meta": { + "ID": "CVE-2019-16561", + "ASSIGNER": "jenkinsci-cert@googlegroups.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins WebSphere Deployer Plugin", + "version": { + "version_data": [ + { + "version_value": "1.6.1", + "version_affected": "<=" + }, + { + "version_value": "1.6.1", + "version_affected": "?>" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Jenkins WebSphere Deployer Plugin 1.6.1 and earlier allows users with Overall/Read access to disable SSL/TLS certificate and hostname validation for the entire Jenkins master JVM." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-295: Improper Certificate Validation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1581", + "url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1581", + "refsource": "CONFIRM" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16562.json b/2019/16xxx/CVE-2019-16562.json new file mode 100644 index 00000000000..42071adbe42 --- /dev/null +++ b/2019/16xxx/CVE-2019-16562.json @@ -0,0 +1,70 @@ +{ + "CVE_data_meta": { + "ID": "CVE-2019-16562", + "ASSIGNER": "jenkinsci-cert@googlegroups.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins buildgraph-view Plugin", + "version": { + "version_data": [ + { + "version_value": "1.8", + "version_affected": "<=" + }, + { + "version_value": "1.5.2", + "version_affected": ">=" + }, + { + "version_value": "1.8", + "version_affected": "?>" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Jenkins buildgraph-view Plugin 1.8 and earlier does not escape the description of builds shown in its view, resulting in a stored XSS vulnerability exploitable by users able to change build descriptions." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1591", + "url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1591", + "refsource": "CONFIRM" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16563.json b/2019/16xxx/CVE-2019-16563.json new file mode 100644 index 00000000000..40ab0a44d2f --- /dev/null +++ b/2019/16xxx/CVE-2019-16563.json @@ -0,0 +1,66 @@ +{ + "CVE_data_meta": { + "ID": "CVE-2019-16563", + "ASSIGNER": "jenkinsci-cert@googlegroups.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Mission Control Plugin", + "version": { + "version_data": [ + { + "version_value": "0.9.16", + "version_affected": "<=" + }, + { + "version_value": "0.9.16", + "version_affected": "?>" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Jenkins Mission Control Plugin 0.9.16 and earlier does not escape job display names and build names shown on its view, resulting in a stored XSS vulnerability exploitable by attackers able to change these properties." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1592", + "url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1592", + "refsource": "CONFIRM" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16564.json b/2019/16xxx/CVE-2019-16564.json new file mode 100644 index 00000000000..e1505be212f --- /dev/null +++ b/2019/16xxx/CVE-2019-16564.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ID": "CVE-2019-16564", + "ASSIGNER": "jenkinsci-cert@googlegroups.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Pipeline Aggregator View Plugin", + "version": { + "version_data": [ + { + "version_value": "1.8", + "version_affected": "<=" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Jenkins Pipeline Aggregator View Plugin 1.8 and earlier does not escape information shown on its view, resulting in a stored XSS vulnerability exploitable by attackers able to affects view content such as job display name or pipeline stage names." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1593", + "url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1593", + "refsource": "CONFIRM" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16565.json b/2019/16xxx/CVE-2019-16565.json new file mode 100644 index 00000000000..4ea82d527f1 --- /dev/null +++ b/2019/16xxx/CVE-2019-16565.json @@ -0,0 +1,66 @@ +{ + "CVE_data_meta": { + "ID": "CVE-2019-16565", + "ASSIGNER": "jenkinsci-cert@googlegroups.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Team Concert Plugin", + "version": { + "version_data": [ + { + "version_value": "1.3.0", + "version_affected": "<=" + }, + { + "version_value": "1.3.0", + "version_affected": "?>" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A cross-site request forgery vulnerability in Jenkins Team Concert Plugin 1.3.0 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-352: Cross-Site Request Forgery (CSRF)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1605%20(1)", + "url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1605%20(1)", + "refsource": "CONFIRM" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16566.json b/2019/16xxx/CVE-2019-16566.json new file mode 100644 index 00000000000..910e75b70b1 --- /dev/null +++ b/2019/16xxx/CVE-2019-16566.json @@ -0,0 +1,66 @@ +{ + "CVE_data_meta": { + "ID": "CVE-2019-16566", + "ASSIGNER": "jenkinsci-cert@googlegroups.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Team Concert Plugin", + "version": { + "version_data": [ + { + "version_value": "1.3.0", + "version_affected": "<=" + }, + { + "version_value": "1.3.0", + "version_affected": "?>" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A missing permission check in Jenkins Team Concert Plugin 1.3.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-285: Improper Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1605%20(1)", + "url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1605%20(1)", + "refsource": "CONFIRM" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16567.json b/2019/16xxx/CVE-2019-16567.json new file mode 100644 index 00000000000..a83bb56cd71 --- /dev/null +++ b/2019/16xxx/CVE-2019-16567.json @@ -0,0 +1,66 @@ +{ + "CVE_data_meta": { + "ID": "CVE-2019-16567", + "ASSIGNER": "jenkinsci-cert@googlegroups.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Team Concert Plugin", + "version": { + "version_data": [ + { + "version_value": "1.3.0", + "version_affected": "<=" + }, + { + "version_value": "1.3.0", + "version_affected": "?>" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A missing permission check in Jenkins Team Concert Plugin 1.3.0 and earlier in form-related methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-285: Improper Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1605%20(2)", + "url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1605%20(2)", + "refsource": "CONFIRM" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16568.json b/2019/16xxx/CVE-2019-16568.json new file mode 100644 index 00000000000..1a84940815b --- /dev/null +++ b/2019/16xxx/CVE-2019-16568.json @@ -0,0 +1,66 @@ +{ + "CVE_data_meta": { + "ID": "CVE-2019-16568", + "ASSIGNER": "jenkinsci-cert@googlegroups.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins SCTMExecutor Plugin", + "version": { + "version_data": [ + { + "version_value": "2.2", + "version_affected": "<=" + }, + { + "version_value": "2.2", + "version_affected": "?>" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Jenkins SCTMExecutor Plugin 2.2 and earlier transmits previously configured service credentials in plain text as part of the global configuration, as well as individual jobs' configurations." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-319: Cleartext Transmission of Sensitive Information" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1521", + "url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1521", + "refsource": "CONFIRM" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16569.json b/2019/16xxx/CVE-2019-16569.json new file mode 100644 index 00000000000..bb17f6e4610 --- /dev/null +++ b/2019/16xxx/CVE-2019-16569.json @@ -0,0 +1,66 @@ +{ + "CVE_data_meta": { + "ID": "CVE-2019-16569", + "ASSIGNER": "jenkinsci-cert@googlegroups.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Mantis Plugin", + "version": { + "version_data": [ + { + "version_value": "0.26", + "version_affected": "<=" + }, + { + "version_value": "0.26", + "version_affected": "?>" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A cross-site request forgery vulnerability in Jenkins Mantis Plugin 0.26 and earlier allows attackers to connect to an attacker-specified web server using attacker-specified credentials." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-352: Cross-Site Request Forgery (CSRF)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1603", + "url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1603", + "refsource": "CONFIRM" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16570.json b/2019/16xxx/CVE-2019-16570.json new file mode 100644 index 00000000000..34d37c87088 --- /dev/null +++ b/2019/16xxx/CVE-2019-16570.json @@ -0,0 +1,66 @@ +{ + "CVE_data_meta": { + "ID": "CVE-2019-16570", + "ASSIGNER": "jenkinsci-cert@googlegroups.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins RapidDeploy Plugin", + "version": { + "version_data": [ + { + "version_value": "4.1", + "version_affected": "<=" + }, + { + "version_value": "4.1", + "version_affected": "?>" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A cross-site request forgery vulnerability in Jenkins RapidDeploy Plugin 4.1 and earlier allows attackers to connect to an attacker-specified web server." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-352: Cross-Site Request Forgery (CSRF)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1604", + "url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1604", + "refsource": "CONFIRM" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16571.json b/2019/16xxx/CVE-2019-16571.json new file mode 100644 index 00000000000..c0eb9802f32 --- /dev/null +++ b/2019/16xxx/CVE-2019-16571.json @@ -0,0 +1,66 @@ +{ + "CVE_data_meta": { + "ID": "CVE-2019-16571", + "ASSIGNER": "jenkinsci-cert@googlegroups.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins RapidDeploy Plugin", + "version": { + "version_data": [ + { + "version_value": "4.1", + "version_affected": "<=" + }, + { + "version_value": "4.1", + "version_affected": "?>" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A missing permission check in Jenkins RapidDeploy Plugin 4.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified web server." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-285: Improper Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1604", + "url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1604", + "refsource": "CONFIRM" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16572.json b/2019/16xxx/CVE-2019-16572.json new file mode 100644 index 00000000000..ba87e66c5da --- /dev/null +++ b/2019/16xxx/CVE-2019-16572.json @@ -0,0 +1,66 @@ +{ + "CVE_data_meta": { + "ID": "CVE-2019-16572", + "ASSIGNER": "jenkinsci-cert@googlegroups.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Weibo Plugin", + "version": { + "version_data": [ + { + "version_value": "1.0.1", + "version_affected": "<=" + }, + { + "version_value": "1.0.1", + "version_affected": "?>" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Jenkins Weibo Plugin 1.0.1 and earlier stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-256: Unprotected Storage of Credentials" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1597", + "url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1597", + "refsource": "CONFIRM" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16573.json b/2019/16xxx/CVE-2019-16573.json new file mode 100644 index 00000000000..fb338dbc65a --- /dev/null +++ b/2019/16xxx/CVE-2019-16573.json @@ -0,0 +1,66 @@ +{ + "CVE_data_meta": { + "ID": "CVE-2019-16573", + "ASSIGNER": "jenkinsci-cert@googlegroups.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Alauda DevOps Pipeline Plugin", + "version": { + "version_data": [ + { + "version_value": "2.3.2", + "version_affected": "<=" + }, + { + "version_value": "2.3.2", + "version_affected": "?>" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A cross-site request forgery vulnerability in Jenkins Alauda DevOps Pipeline Plugin 2.3.2 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-352: Cross-Site Request Forgery (CSRF)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1600", + "url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1600", + "refsource": "CONFIRM" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16574.json b/2019/16xxx/CVE-2019-16574.json new file mode 100644 index 00000000000..57c38666d3f --- /dev/null +++ b/2019/16xxx/CVE-2019-16574.json @@ -0,0 +1,66 @@ +{ + "CVE_data_meta": { + "ID": "CVE-2019-16574", + "ASSIGNER": "jenkinsci-cert@googlegroups.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Alauda DevOps Pipeline Plugin", + "version": { + "version_data": [ + { + "version_value": "2.3.2", + "version_affected": "<=" + }, + { + "version_value": "2.3.2", + "version_affected": "?>" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A missing permission check in Jenkins Alauda DevOps Pipeline Plugin 2.3.2 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-285: Improper Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1600", + "url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1600", + "refsource": "CONFIRM" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16575.json b/2019/16xxx/CVE-2019-16575.json new file mode 100644 index 00000000000..9366f43c391 --- /dev/null +++ b/2019/16xxx/CVE-2019-16575.json @@ -0,0 +1,66 @@ +{ + "CVE_data_meta": { + "ID": "CVE-2019-16575", + "ASSIGNER": "jenkinsci-cert@googlegroups.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Alauda Kubernetes Suport Plugin", + "version": { + "version_data": [ + { + "version_value": "2.3.0", + "version_affected": "<=" + }, + { + "version_value": "2.3.0", + "version_affected": "?>" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A cross-site request forgery vulnerability in Jenkins Alauda Kubernetes Suport Plugin 2.3.0 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing the Kubernetes service account token or credentials stored in Jenkins." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-352: Cross-Site Request Forgery (CSRF)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1602", + "url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1602", + "refsource": "CONFIRM" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16576.json b/2019/16xxx/CVE-2019-16576.json new file mode 100644 index 00000000000..99905ed04a9 --- /dev/null +++ b/2019/16xxx/CVE-2019-16576.json @@ -0,0 +1,66 @@ +{ + "CVE_data_meta": { + "ID": "CVE-2019-16576", + "ASSIGNER": "jenkinsci-cert@googlegroups.com" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Jenkins project", + "product": { + "product_data": [ + { + "product_name": "Jenkins Alauda Kubernetes Suport Plugin", + "version": { + "version_data": [ + { + "version_value": "2.3.0", + "version_affected": "<=" + }, + { + "version_value": "2.3.0", + "version_affected": "?>" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A missing permission check in Jenkins Alauda Kubernetes Suport Plugin 2.3.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing the Kubernetes service account token or credentials stored in Jenkins." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-285: Improper Authorization" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1602", + "url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1602", + "refsource": "CONFIRM" + } + ] + } +} \ No newline at end of file