Jenkins Continuous Integration with Toad Edge 2.2 for Jenkins

CPE Details

Jenkins Continuous Integration with Toad Edge 2.2 for Jenkins
2.2
2022-04-04
14h35 +00:00
2022-04-04
15h37 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:jenkins:continuous_integration_with_toad_edge:2.2:*:*:*:*:jenkins:*:*

Informations

Vendor

jenkins

Product

continuous_integration_with_toad_edge

Version

2.2

Target Software

jenkins

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2022-28148 2022-03-29 10h31 +00:00 The file browser in Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier may interpret some paths to files as absolute on Windows, resulting in a path traversal vulnerability allowing attackers with Item/Read permission to obtain the contents of arbitrary files on Windows controllers.
6.5
Moyen
CVE-2022-28147 2022-03-29 10h31 +00:00 A missing permission check in Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier allows attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
4.3
Moyen
CVE-2022-28146 2022-03-29 10h31 +00:00 Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier allows attackers with Item/Configure permission to read arbitrary files on the Jenkins controller by specifying an input folder on the Jenkins controller as a parameter to its build steps.
6.5
Moyen
CVE-2022-28145 2022-03-29 10h31 +00:00 Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier does not apply Content-Security-Policy headers to report files it serves, resulting in a stored cross-site scripting (XSS) exploitable by attackers with Item/Configure permission or otherwise able to control report contents.
5.4
Moyen