Embeddable Build Status Jenkins Embeddable Build Status

Do you want an email whenever new security vulnerabilities are reported in Jenkins Embeddable Build Status?

By the Year

In 2024 there have been 0 vulnerabilities in Jenkins Embeddable Build Status . Embeddable Build Status did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 0 0.00
2022 3 7.03
2021 0 0.00
2020 0 0.00
2019 1 6.10
2018 0 0.00

It may take a day or so for new Embeddable Build Status vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Jenkins Embeddable Build Status Security Vulnerabilities

Jenkins Embeddable Build Status Plugin 2.0.3 and earlier does not correctly perform the ViewStatus permission check in the HTTP endpoint it provides for "unprotected" status badge access

CVE-2022-34180 7.5 - High - June 23, 2022

Jenkins Embeddable Build Status Plugin 2.0.3 and earlier does not correctly perform the ViewStatus permission check in the HTTP endpoint it provides for "unprotected" status badge access, allowing attackers without any permissions to obtain the build status badge icon for any attacker-specified job and/or build.

AuthZ

Jenkins Embeddable Build Status Plugin 2.0.3 and earlier allows specifying a `style` query parameter

CVE-2022-34179 7.5 - High - June 23, 2022

Jenkins Embeddable Build Status Plugin 2.0.3 and earlier allows specifying a `style` query parameter that is used to choose a different SVG image style without restricting possible values, resulting in a relative path traversal vulnerability that allows attackers without Overall/Read permission to specify paths to other SVG images on the Jenkins controller file system.

Directory traversal

Jenkins Embeddable Build Status Plugin 2.0.3 allows specifying a 'link' query parameter

CVE-2022-34178 6.1 - Medium - June 23, 2022

Jenkins Embeddable Build Status Plugin 2.0.3 allows specifying a 'link' query parameter that build status badges will link to, without restricting possible values, resulting in a reflected cross-site scripting (XSS) vulnerability.

XSS

A reflected cross site scripting vulnerability in Jenkins Embeddable Build Status Plugin 2.0.1 and earlier

CVE-2019-10346 6.1 - Medium - July 11, 2019

A reflected cross site scripting vulnerability in Jenkins Embeddable Build Status Plugin 2.0.1 and earlier allowed attackers inject arbitrary HTML and JavaScript into the response of this plugin.

XSS

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Jenkins Embeddable Build Status or by Jenkins? Click the Watch button to subscribe.

Jenkins
Vendor

subscribe