From d5a0988c2b0f867b01f759ff2eeba4701c1b5850 Mon Sep 17 00:00:00 2001 From: Kurt Seifried Date: Tue, 31 Jul 2018 15:55:56 -0600 Subject: [PATCH] Jenkins CVEs --- 2018/1999xxx/CVE-2018-1999025.json | 1 + 2018/1999xxx/CVE-2018-1999026.json | 1 + 2018/1999xxx/CVE-2018-1999027.json | 1 + 2018/1999xxx/CVE-2018-1999028.json | 1 + 2018/1999xxx/CVE-2018-1999029.json | 1 + 2018/1999xxx/CVE-2018-1999030.json | 1 + 2018/1999xxx/CVE-2018-1999031.json | 1 + 2018/1999xxx/CVE-2018-1999032.json | 1 + 2018/1999xxx/CVE-2018-1999033.json | 1 + 2018/1999xxx/CVE-2018-1999034.json | 1 + 2018/1999xxx/CVE-2018-1999035.json | 1 + 11 files changed, 11 insertions(+) create mode 100644 2018/1999xxx/CVE-2018-1999025.json create mode 100644 2018/1999xxx/CVE-2018-1999026.json create mode 100644 2018/1999xxx/CVE-2018-1999027.json create mode 100644 2018/1999xxx/CVE-2018-1999028.json create mode 100644 2018/1999xxx/CVE-2018-1999029.json create mode 100644 2018/1999xxx/CVE-2018-1999030.json create mode 100644 2018/1999xxx/CVE-2018-1999031.json create mode 100644 2018/1999xxx/CVE-2018-1999032.json create mode 100644 2018/1999xxx/CVE-2018-1999033.json create mode 100644 2018/1999xxx/CVE-2018-1999034.json create mode 100644 2018/1999xxx/CVE-2018-1999035.json diff --git a/2018/1999xxx/CVE-2018-1999025.json b/2018/1999xxx/CVE-2018-1999025.json new file mode 100644 index 00000000000..755d9d8111d --- /dev/null +++ b/2018/1999xxx/CVE-2018-1999025.json @@ -0,0 +1 @@ +{"data_version": "4.0","references": {"reference_data": [{"url": "https://jenkins.io/security/advisory/2018-07-30/#SECURITY-932"}]},"description": {"description_data": [{"lang": "eng","value": "A man in the middle vulnerability exists in Jenkins TraceTronic ECU-TEST Plugin 2.3 and earlier in ATXPublisher.java, ATXValidator.java that allows attackers to impersonate any service that Jenkins connects to."}]},"data_type": "CVE","affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"version": {"version_data": [{"version_value": "2.3 and earlier"}]},"product_name": "Jenkins TraceTronic ECU-TEST Plugin"}]},"vendor_name": "Jenkins project"}]}},"CVE_data_meta": {"DATE_ASSIGNED": "2018-07-31T15:54:50.966576","DATE_REQUESTED": "2018-07-30T00:00:00","ID": "CVE-2018-1999025","ASSIGNER": "kurt@seifried.org","REQUESTER": "ml@beckweb.net"},"data_format": "MITRE","problemtype": {"problemtype_data": [{"description": [{"lang": "eng","value": "CWE-295"}]}]}} \ No newline at end of file diff --git a/2018/1999xxx/CVE-2018-1999026.json b/2018/1999xxx/CVE-2018-1999026.json new file mode 100644 index 00000000000..1827a56aaf4 --- /dev/null +++ b/2018/1999xxx/CVE-2018-1999026.json @@ -0,0 +1 @@ +{"data_version": "4.0","references": {"reference_data": [{"url": "https://jenkins.io/security/advisory/2018-07-30/#SECURITY-994"}]},"description": {"description_data": [{"lang": "eng","value": "A server-side request forgery vulnerability exists in Jenkins TraceTronic ECU-TEST Plugin 2.3 and earlier in ATXPublisher.java that allows attackers to have Jenkins send HTTP requests to an attacker-specified host."}]},"data_type": "CVE","affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"version": {"version_data": [{"version_value": "2.3 and earlier"}]},"product_name": "Jenkins TraceTronic ECU-TEST Plugin"}]},"vendor_name": "Jenkins project"}]}},"CVE_data_meta": {"DATE_ASSIGNED": "2018-07-31T15:54:50.967739","DATE_REQUESTED": "2018-07-30T00:00:00","ID": "CVE-2018-1999026","ASSIGNER": "kurt@seifried.org","REQUESTER": "ml@beckweb.net"},"data_format": "MITRE","problemtype": {"problemtype_data": [{"description": [{"lang": "eng","value": "CWE-285"}]}]}} \ No newline at end of file diff --git a/2018/1999xxx/CVE-2018-1999027.json b/2018/1999xxx/CVE-2018-1999027.json new file mode 100644 index 00000000000..03c1dd5b134 --- /dev/null +++ b/2018/1999xxx/CVE-2018-1999027.json @@ -0,0 +1 @@ +{"data_version": "4.0","references": {"reference_data": [{"url": "https://jenkins.io/security/advisory/2018-07-30/#SECURITY-1009"}]},"description": {"description_data": [{"lang": "eng","value": "A exposure of sensitive information vulnerability exists in Jenkins SaltStack Plugin 3.1.6 and earlier in SaltAPIBuilder.java, SaltAPIStep.java that allows attackers to capture credentials with a known credentials ID stored in Jenkins."}]},"data_type": "CVE","affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"version": {"version_data": [{"version_value": "3.1.6 and earlier"}]},"product_name": "Jenkins SaltStack Plugin"}]},"vendor_name": "Jenkins project"}]}},"CVE_data_meta": {"DATE_ASSIGNED": "2018-07-31T15:54:50.968751","DATE_REQUESTED": "2018-07-30T00:00:00","ID": "CVE-2018-1999027","ASSIGNER": "kurt@seifried.org","REQUESTER": "ml@beckweb.net"},"data_format": "MITRE","problemtype": {"problemtype_data": [{"description": [{"lang": "eng","value": "CWE-285"}]}]}} \ No newline at end of file diff --git a/2018/1999xxx/CVE-2018-1999028.json b/2018/1999xxx/CVE-2018-1999028.json new file mode 100644 index 00000000000..39673d5d13b --- /dev/null +++ b/2018/1999xxx/CVE-2018-1999028.json @@ -0,0 +1 @@ +{"data_version": "4.0","references": {"reference_data": [{"url": "https://jenkins.io/security/advisory/2018-07-30/#SECURITY-1021"}]},"description": {"description_data": [{"lang": "eng","value": "A exposure of sensitive information vulnerability exists in Jenkins Accurev Plugin 0.7.16 and earlier in AccurevSCM.java that allows attackers to capture credentials with a known credentials ID stored in Jenkins."}]},"data_type": "CVE","affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"version": {"version_data": [{"version_value": "0.7.16 and earlier"}]},"product_name": "Jenkins Accurev Plugin"}]},"vendor_name": "Jenkins project"}]}},"CVE_data_meta": {"DATE_ASSIGNED": "2018-07-31T15:54:50.969769","DATE_REQUESTED": "2018-07-30T00:00:00","ID": "CVE-2018-1999028","ASSIGNER": "kurt@seifried.org","REQUESTER": "ml@beckweb.net"},"data_format": "MITRE","problemtype": {"problemtype_data": [{"description": [{"lang": "eng","value": "CWE-285"}]}]}} \ No newline at end of file diff --git a/2018/1999xxx/CVE-2018-1999029.json b/2018/1999xxx/CVE-2018-1999029.json new file mode 100644 index 00000000000..664a943c119 --- /dev/null +++ b/2018/1999xxx/CVE-2018-1999029.json @@ -0,0 +1 @@ +{"data_version": "4.0","references": {"reference_data": [{"url": "https://jenkins.io/security/advisory/2018-07-30/#SECURITY-1001"}]},"description": {"description_data": [{"lang": "eng","value": "A cross-site scripting vulnerability exists in Jenkins Shelve Project Plugin 1.5 and earlier in ShelveProjectAction/index.jelly, ShelvedProjectsAction/index.jelly that allows attackers with Job/Configure permission to define JavaScript that would be executed in another user's browser when that other user performs some UI actions."}]},"data_type": "CVE","affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"version": {"version_data": [{"version_value": "1.5 and earlier"}]},"product_name": "Jenkins Shelve Project Plugin"}]},"vendor_name": "Jenkins project"}]}},"CVE_data_meta": {"DATE_ASSIGNED": "2018-07-31T15:54:50.970671","DATE_REQUESTED": "2018-07-30T00:00:00","ID": "CVE-2018-1999029","ASSIGNER": "kurt@seifried.org","REQUESTER": "ml@beckweb.net"},"data_format": "MITRE","problemtype": {"problemtype_data": [{"description": [{"lang": "eng","value": "CWE-79"}]}]}} \ No newline at end of file diff --git a/2018/1999xxx/CVE-2018-1999030.json b/2018/1999xxx/CVE-2018-1999030.json new file mode 100644 index 00000000000..09297a76004 --- /dev/null +++ b/2018/1999xxx/CVE-2018-1999030.json @@ -0,0 +1 @@ +{"data_version": "4.0","references": {"reference_data": [{"url": "https://jenkins.io/security/advisory/2018-07-30/#SECURITY-1022"}]},"description": {"description_data": [{"lang": "eng","value": "A exposure of sensitive information vulnerability exists in Jenkins Maven Artifact ChoiceListProvider (Nexus) Plugin 1.3.1 and earlier in ArtifactoryChoiceListProvider.java, NexusChoiceListProvider.java, Nexus3ChoiceListProvider.java that allows attackers to capture credentials with a known credentials ID stored in Jenkins."}]},"data_type": "CVE","affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"version": {"version_data": [{"version_value": "1.3.1 and earlier"}]},"product_name": "Jenkins Maven Artifact ChoiceListProvider (Nexus) Plugin"}]},"vendor_name": "Jenkins project"}]}},"CVE_data_meta": {"DATE_ASSIGNED": "2018-07-31T15:54:50.971554","DATE_REQUESTED": "2018-07-30T00:00:00","ID": "CVE-2018-1999030","ASSIGNER": "kurt@seifried.org","REQUESTER": "ml@beckweb.net"},"data_format": "MITRE","problemtype": {"problemtype_data": [{"description": [{"lang": "eng","value": "CWE-285"}]}]}} \ No newline at end of file diff --git a/2018/1999xxx/CVE-2018-1999031.json b/2018/1999xxx/CVE-2018-1999031.json new file mode 100644 index 00000000000..df9f71c7898 --- /dev/null +++ b/2018/1999xxx/CVE-2018-1999031.json @@ -0,0 +1 @@ +{"data_version": "4.0","references": {"reference_data": [{"url": "https://jenkins.io/security/advisory/2018-07-30/#SECURITY-847"}]},"description": {"description_data": [{"lang": "eng","value": "A exposure of sensitive information vulnerability exists in Jenkins meliora-testlab Plugin 1.14 and earlier in TestlabNotifier.java that allows attackers with file system access to the Jenkins master to obtain the API key stored in this plugin's configuration."}]},"data_type": "CVE","affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"version": {"version_data": [{"version_value": "1.14 and earlier"}]},"product_name": "Jenkins meliora-testlab Plugin"}]},"vendor_name": "Jenkins project"}]}},"CVE_data_meta": {"DATE_ASSIGNED": "2018-07-31T15:54:50.972368","DATE_REQUESTED": "2018-07-30T00:00:00","ID": "CVE-2018-1999031","ASSIGNER": "kurt@seifried.org","REQUESTER": "ml@beckweb.net"},"data_format": "MITRE","problemtype": {"problemtype_data": [{"description": [{"lang": "eng","value": "CWE-522"}]}]}} \ No newline at end of file diff --git a/2018/1999xxx/CVE-2018-1999032.json b/2018/1999xxx/CVE-2018-1999032.json new file mode 100644 index 00000000000..d34611593e7 --- /dev/null +++ b/2018/1999xxx/CVE-2018-1999032.json @@ -0,0 +1 @@ +{"data_version": "4.0","references": {"reference_data": [{"url": "https://jenkins.io/security/advisory/2018-07-30/#SECURITY-995"}]},"description": {"description_data": [{"lang": "eng","value": "A data modification vulnerability exists in Jenkins Agiletestware Pangolin Connector for TestRail Plugin 2.1 and earlier in GlobalConfig.java that allows attackers with Overall/Read permission to override this plugin's configuration by sending crafted HTTP requests to an unprotected endpoint."}]},"data_type": "CVE","affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"version": {"version_data": [{"version_value": "2.1 and earlier"}]},"product_name": "Jenkins Agiletestware Pangolin Connector for TestRail Plugin"}]},"vendor_name": "Jenkins project"}]}},"CVE_data_meta": {"DATE_ASSIGNED": "2018-07-31T15:54:50.973212","DATE_REQUESTED": "2018-07-30T00:00:00","ID": "CVE-2018-1999032","ASSIGNER": "kurt@seifried.org","REQUESTER": "ml@beckweb.net"},"data_format": "MITRE","problemtype": {"problemtype_data": [{"description": [{"lang": "eng","value": "CWE-285"}]}]}} \ No newline at end of file diff --git a/2018/1999xxx/CVE-2018-1999033.json b/2018/1999xxx/CVE-2018-1999033.json new file mode 100644 index 00000000000..0c9f27abb5b --- /dev/null +++ b/2018/1999xxx/CVE-2018-1999033.json @@ -0,0 +1 @@ +{"data_version": "4.0","references": {"reference_data": [{"url": "https://jenkins.io/security/advisory/2018-07-30/#SECURITY-1039"}]},"description": {"description_data": [{"lang": "eng","value": "A exposure of sensitive information vulnerability exists in Jenkins Anchore Container Image Scanner Plugin 10.16 and earlier in AnchoreBuilder.java that allows attackers with Item/ExtendedRead permission or file system access to the Jenkins master to obtain the password stored in this plugin's configuration."}]},"data_type": "CVE","affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"version": {"version_data": [{"version_value": "10.16 and earlier"}]},"product_name": "Jenkins Anchore Container Image Scanner Plugin"}]},"vendor_name": "Jenkins project"}]}},"CVE_data_meta": {"DATE_ASSIGNED": "2018-07-31T15:54:50.974279","DATE_REQUESTED": "2018-07-30T00:00:00","ID": "CVE-2018-1999033","ASSIGNER": "kurt@seifried.org","REQUESTER": "ml@beckweb.net"},"data_format": "MITRE","problemtype": {"problemtype_data": [{"description": [{"lang": "eng","value": "CWE-522"}]}]}} \ No newline at end of file diff --git a/2018/1999xxx/CVE-2018-1999034.json b/2018/1999xxx/CVE-2018-1999034.json new file mode 100644 index 00000000000..8b8b3009379 --- /dev/null +++ b/2018/1999xxx/CVE-2018-1999034.json @@ -0,0 +1 @@ +{"data_version": "4.0","references": {"reference_data": [{"url": "https://jenkins.io/security/advisory/2018-07-30/#SECURITY-933"}]},"description": {"description_data": [{"lang": "eng","value": "A man in the middle vulnerability exists in Jenkins Inedo ProGet Plugin 0.8 and earlier in ProGetApi.java, ProGetConfig.java, ProGetConfiguration.java that allows attackers to impersonate any service that Jenkins connects to."}]},"data_type": "CVE","affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"version": {"version_data": [{"version_value": "0.8 and earlier"}]},"product_name": "Jenkins Inedo ProGet Plugin"}]},"vendor_name": "Jenkins project"}]}},"CVE_data_meta": {"DATE_ASSIGNED": "2018-07-31T15:54:50.975168","DATE_REQUESTED": "2018-07-30T00:00:00","ID": "CVE-2018-1999034","ASSIGNER": "kurt@seifried.org","REQUESTER": "ml@beckweb.net"},"data_format": "MITRE","problemtype": {"problemtype_data": [{"description": [{"lang": "eng","value": "CWE-295"}]}]}} \ No newline at end of file diff --git a/2018/1999xxx/CVE-2018-1999035.json b/2018/1999xxx/CVE-2018-1999035.json new file mode 100644 index 00000000000..116cbd8ae63 --- /dev/null +++ b/2018/1999xxx/CVE-2018-1999035.json @@ -0,0 +1 @@ +{"data_version": "4.0","references": {"reference_data": [{"url": "https://jenkins.io/security/advisory/2018-07-30/#SECURITY-935"}]},"description": {"description_data": [{"lang": "eng","value": "A man in the middle vulnerability exists in Jenkins Inedo BuildMaster Plugin 1.3 and earlier in BuildMasterConfiguration.java, BuildMasterConfig.java, BuildMasterApi.java that allows attackers to impersonate any service that Jenkins connects to."}]},"data_type": "CVE","affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"version": {"version_data": [{"version_value": "1.3 and earlier"}]},"product_name": "Jenkins Inedo BuildMaster Plugin"}]},"vendor_name": "Jenkins project"}]}},"CVE_data_meta": {"DATE_ASSIGNED": "2018-07-31T15:54:50.975986","DATE_REQUESTED": "2018-07-30T00:00:00","ID": "CVE-2018-1999035","ASSIGNER": "kurt@seifried.org","REQUESTER": "ml@beckweb.net"},"data_format": "MITRE","problemtype": {"problemtype_data": [{"description": [{"lang": "eng","value": "CWE-295"}]}]}} \ No newline at end of file