Site icon API Security Blog

RHEL 8 : Jenkins and Jenkins-2-plugins (RHSA-2024:0778)

The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2024:0778 advisory. google-oauth-client: missing PKCE support in accordance with the RFC for OAuth 2.0 for Native Apps can lead to improper authorization (CVE-2020-7692) maven: Block repositories using http by default (CVE-2021-26291) golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962) snakeyaml: Denial of Service due to missing nested depth limitation for collections (CVE-2022-25857) maven-shared-utils: Command injection via Commandline class (CVE-2022-29599) apache-commons-text: variable interpolation RCE (CVE-2022-42889) guava: insecure temporary directory creation (CVE-2023-2976) springframework: Spring Expression DoS Vulnerability (CVE-2023-20861) spring-security: Empty SecurityContext Is Not Properly Saved Upon Logout (CVE-2023-20862) jenkins-2-plugins/script-security: Sandbox bypass vulnerability in Script Security Plugin (CVE-2023-24422) jenkins-2-plugins/JUnit: Stored XSS vulnerability in JUnit Plugin (CVE-2023-25761) jenkins-2-plugins/pipeline-build-step: Stored XSS vulnerability in Pipeline: Build Step Plugin (CVE-2023-25762) jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter() (CVE-2023-26048) jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies (CVE-2023-26049) Jenkins: Temporary…Read More

Exit mobile version