Convert To Pipeline Jenkins Convert To Pipeline

Do you want an email whenever new security vulnerabilities are reported in Jenkins Convert To Pipeline?

By the Year

In 2024 there have been 0 vulnerabilities in Jenkins Convert To Pipeline . Last year Convert To Pipeline had 2 security vulnerabilities published. Right now, Convert To Pipeline is on track to have less security vulnerabilities in 2024 than it did last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 2 9.30
2022 0 0.00
2021 0 0.00
2020 0 0.00
2019 0 0.00
2018 0 0.00

It may take a day or so for new Convert To Pipeline vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Jenkins Convert To Pipeline Security Vulnerabilities

A cross-site request forgery (CSRF) vulnerability in Jenkins Convert To Pipeline Plugin 1.0 and earlier

CVE-2023-28676 8.8 - High - April 02, 2023

A cross-site request forgery (CSRF) vulnerability in Jenkins Convert To Pipeline Plugin 1.0 and earlier allows attackers to create a Pipeline based on a Freestyle project, potentially leading to remote code execution (RCE).

Session Riding

Jenkins Convert To Pipeline Plugin 1.0 and earlier uses basic string concatenation to convert Freestyle projects' Build Environment, Build Steps, and Post-build Actions to the equivalent Pipeline step invocations, allowing attackers able to configure Freestyle projects to prepare a crafted configuration

CVE-2023-28677 9.8 - Critical - April 02, 2023

Jenkins Convert To Pipeline Plugin 1.0 and earlier uses basic string concatenation to convert Freestyle projects' Build Environment, Build Steps, and Post-build Actions to the equivalent Pipeline step invocations, allowing attackers able to configure Freestyle projects to prepare a crafted configuration that injects Pipeline script code into the (unsandboxed) Pipeline resulting from a convertion by Jenkins Convert To Pipeline Plugin.

Command Injection

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Jenkins Convert To Pipeline or by Jenkins? Click the Watch button to subscribe.

Jenkins
Vendor

subscribe