Vulnerability & Exploit Database

Displaying entries 1 - 10 of 140793 in total

Moodle: (CVE-2019-3809): MSA-19-0002: Blind SSRF Risk in /badges/mybackpack.php Vulnerability

  • Severity: 4
  • Published: January 21, 2019

Details for this vulnerability have not been published by NIST at this point. Descriptions from software vendor advisories for this issue are provided below.

From MSA-19-0002:

The mybackpack functionality allowed setting the URL of badges, when it should be restricted to the Mozilla Open Badges backpack URL. This re...

Moodle: (CVE-2019-3808): MSA-19-0001: Manage groups capability is missing XSS risk flag Vulnerability

  • Severity: 4
  • Published: January 21, 2019

Details for this vulnerability have not been published by NIST at this point. Descriptions from software vendor advisories for this issue are provided below.

From MSA-19-0001:

The 'manage groups' capability did not have the 'XSS risk' flag assigned to it, but does have that access in certain places. Note that the ca...

Jenkins Advisory 2019-01-16: Vulnerability

  • Severity: 4
  • Published: January 21, 2019

When using an external security realm such as LDAP or Active Directory, deleting a user from the security realm does not result in the user losing access to Jenkins. While deleting the user record from Jenkins did invalidate the 'Remember me' cookie, there was no way to invalidate active sessions besides restarting Jenkins or terminating...

Jenkins Advisory 2019-01-16: Vulnerability

  • Severity: 4
  • Published: January 21, 2019

Users with the Overall/RunScripts permission (typically administrators) were able to use the Jenkins script console to craft a 'Remember me' cookie that would never expire. This allowed attackers access to a Jenkins instance while the corresponding user in the configured security realm exists, for example to persist access after another ...

Jenkins Advisory 2018-10-10: Vulnerability

  • Severity: 4
  • Published: January 21, 2019

A path traversal vulnerability in Stapler allowed viewing routable objects with views defined on any type. This could be used to access internal data of routable objects, commonly by showing their string representation (#toString())

Jenkins Advisory 2018-10-10: Vulnerability

  • Severity: 4
  • Published: January 21, 2019

When Jenkins fails to process form submissions due to an internal error, the error message shown to the user and written to the log typically includes the serialized JSON form submission. Secrets, such as submitted passwords, might be included with the JSON object, and shown or written to disk in plain text.

Jenkins Advisory 2018-10-10: Vulnerability

  • Severity: 4
  • Published: January 21, 2019

When signing up for a new user account on instances using Jenkins' own user database, Jenkins did not invalidate the existing session and create a new one. This allowed session fixation.

Jenkins Advisory 2018-10-10: Vulnerability

  • Severity: 4
  • Published: January 21, 2019

The wrapper query parameter for the XML variant of the Jenkins remote API did not validate the specified tag name. This resulted in a reflected cross-site scripting vulnerability.

Jenkins Advisory 2018-10-10: Vulnerability

  • Severity: 4
  • Published: January 21, 2019

By accessing a specific crafted URL on Jenkins instances using Jenkins' own user database, users without Overall/Read access could create ephemeral user records.