Vulnerabilities (CVE)

Filtered by vendor Jenkins Subscribe
Filtered by product Gitlab
Total 5 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-43411 1 Jenkins 1 Gitlab 2024-11-21 N/A 5.3 MEDIUM
Jenkins GitLab Plugin 1.5.35 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token.
CVE-2022-34777 1 Jenkins 1 Gitlab 2024-11-21 3.5 LOW 5.4 MEDIUM
Jenkins GitLab Plugin 1.5.34 and earlier does not escape multiple fields inserted into the description of webhook-triggered builds, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
CVE-2022-30955 1 Jenkins 1 Gitlab 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
Jenkins GitLab Plugin 1.5.31 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
CVE-2019-10301 1 Jenkins 1 Gitlab 2024-11-21 4.0 MEDIUM 8.8 HIGH
A missing permission check in Jenkins GitLab Plugin 1.5.11 and earlier in the GitLabConnectionConfig#doTestConnection form validation method allowed attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
CVE-2019-10300 1 Jenkins 1 Gitlab 2024-11-21 3.5 LOW 8.0 HIGH
A cross-site request forgery vulnerability in Jenkins GitLab Plugin 1.5.11 and earlier in the GitLabConnectionConfig#doTestConnection form validation method allowed attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.