All the vulnerabilites related to Jenkins Project - Jenkins MATLAB Plugin
cve-2023-49654
Vulnerability from cvelistv5
Published
2023-11-29 13:45
Modified
2025-02-13 17:18
Severity ?
EPSS score ?
Summary
Missing permission checks in Jenkins MATLAB Plugin 2.11.0 and earlier allow attackers to have Jenkins parse an XML file from the Jenkins controller file system.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Jenkins Project | Jenkins MATLAB Plugin |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:01:25.660Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "Jenkins Security Advisory 2023-11-29", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.jenkins.io/security/advisory/2023-11-29/#SECURITY-3193" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2023/11/29/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Jenkins MATLAB Plugin", "vendor": "Jenkins Project", "versions": [ { "lessThanOrEqual": "2.11.0", "status": "affected", "version": "0", "versionType": "maven" } ] } ], "descriptions": [ { "lang": "en", "value": "Missing permission checks in Jenkins MATLAB Plugin 2.11.0 and earlier allow attackers to have Jenkins parse an XML file from the Jenkins controller file system." } ], "providerMetadata": { "dateUpdated": "2023-11-29T13:50:08.160Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "name": "Jenkins Security Advisory 2023-11-29", "tags": [ "vendor-advisory" ], "url": "https://www.jenkins.io/security/advisory/2023-11-29/#SECURITY-3193" }, { "url": "http://www.openwall.com/lists/oss-security/2023/11/29/1" } ] } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2023-49654", "datePublished": "2023-11-29T13:45:10.938Z", "dateReserved": "2023-11-28T21:18:14.327Z", "dateUpdated": "2025-02-13T17:18:47.815Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49656
Vulnerability from cvelistv5
Published
2023-11-29 13:45
Modified
2025-02-13 17:18
Severity ?
EPSS score ?
Summary
Jenkins MATLAB Plugin 2.11.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Jenkins Project | Jenkins MATLAB Plugin |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:01:26.016Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "Jenkins Security Advisory 2023-11-29", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.jenkins.io/security/advisory/2023-11-29/#SECURITY-3193" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2023/11/29/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Jenkins MATLAB Plugin", "vendor": "Jenkins Project", "versions": [ { "lessThanOrEqual": "2.11.0", "status": "affected", "version": "0", "versionType": "maven" } ] } ], "descriptions": [ { "lang": "en", "value": "Jenkins MATLAB Plugin 2.11.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks." } ], "providerMetadata": { "dateUpdated": "2023-11-29T13:50:10.208Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "name": "Jenkins Security Advisory 2023-11-29", "tags": [ "vendor-advisory" ], "url": "https://www.jenkins.io/security/advisory/2023-11-29/#SECURITY-3193" }, { "url": "http://www.openwall.com/lists/oss-security/2023/11/29/1" } ] } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2023-49656", "datePublished": "2023-11-29T13:45:12.215Z", "dateReserved": "2023-11-28T21:18:14.328Z", "dateUpdated": "2025-02-13T17:18:49.036Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49655
Vulnerability from cvelistv5
Published
2023-11-29 13:45
Modified
2025-02-13 17:18
Severity ?
EPSS score ?
Summary
A cross-site request forgery (CSRF) vulnerability in Jenkins MATLAB Plugin 2.11.0 and earlier allows attackers to have Jenkins parse an XML file from the Jenkins controller file system.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Jenkins Project | Jenkins MATLAB Plugin |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:01:25.849Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "Jenkins Security Advisory 2023-11-29", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.jenkins.io/security/advisory/2023-11-29/#SECURITY-3193" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2023/11/29/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Jenkins MATLAB Plugin", "vendor": "Jenkins Project", "versions": [ { "lessThanOrEqual": "2.11.0", "status": "affected", "version": "0", "versionType": "maven" } ] } ], "descriptions": [ { "lang": "en", "value": "A cross-site request forgery (CSRF) vulnerability in Jenkins MATLAB Plugin 2.11.0 and earlier allows attackers to have Jenkins parse an XML file from the Jenkins controller file system." } ], "providerMetadata": { "dateUpdated": "2023-11-29T13:50:09.231Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "name": "Jenkins Security Advisory 2023-11-29", "tags": [ "vendor-advisory" ], "url": "https://www.jenkins.io/security/advisory/2023-11-29/#SECURITY-3193" }, { "url": "http://www.openwall.com/lists/oss-security/2023/11/29/1" } ] } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2023-49655", "datePublished": "2023-11-29T13:45:11.577Z", "dateReserved": "2023-11-28T21:18:14.328Z", "dateUpdated": "2025-02-13T17:18:48.409Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }