Paaslane Estimate Jenkins Paaslane Estimate

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Jenkins Paaslane Estimate.

By the Year

In 2025 there have been 0 vulnerabilities in Jenkins Paaslane Estimate. Paaslane Estimate did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2025 0 0.00
2024 0 0.00
2023 4 5.43

It may take a day or so for new Paaslane Estimate vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Jenkins Paaslane Estimate Security Vulnerabilities

Missing perms in Jenkins PaaSLane Estimate Plugin <=1.0.4 allow attacker
CVE-2023-50779 4.3 - Medium - December 13, 2023

Missing permission checks in Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified URL using an attacker-specified token.

AuthZ

Jenkins PaaSLane Estimate Plugin 1.0.4 CSRF: external URL redirect via token
CVE-2023-50778 8.8 - High - December 13, 2023

A cross-site request forgery (CSRF) vulnerability in Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier allows attackers to connect to an attacker-specified URL using an attacker-specified token.

Session Riding

Jenkins PaaSLane Plugin 1.0.4 - Auth Token Leak
CVE-2023-50777 4.3 - Medium - December 13, 2023

Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier does not mask PaaSLane authentication tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them.

Cleartext Storage of Sensitive Information

Jenkins PaaSLane Estimate Plugin <=1.0.4 Unencrypted Auth Tokens in config.xml
CVE-2023-50776 4.3 - Medium - December 13, 2023

Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier stores PaaSLane authentication tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.

Cleartext Storage of Sensitive Information

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Jenkins Paaslane Estimate or by Jenkins? Click the Watch button to subscribe.

Jenkins
Vendor

subscribe