Filtered by vendor Jenkins Subscriptions
Filtered by product Subversion Subscriptions
Total 7 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2022-29048 2 Apple, Jenkins 2 Macos, Subversion 2024-11-21 4.3 Medium
A cross-site request forgery (CSRF) vulnerability in Jenkins Subversion Plugin 2.15.3 and earlier allows attackers to connect to an attacker-specified URL.
CVE-2022-29046 3 Apple, Jenkins, Redhat 3 Macos, Subversion, Openshift 2024-11-21 5.4 Medium
Jenkins Subversion Plugin 2.15.3 and earlier does not escape the name and description of List Subversion tags (and more) parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
CVE-2021-21698 2 Jenkins, Redhat 2 Subversion, Openshift 2024-11-21 7.5 High
Jenkins Subversion Plugin 2.15.0 and earlier does not restrict the name of a file when looking up a subversion key file on the controller from an agent.
CVE-2020-2304 2 Jenkins, Redhat 2 Subversion, Openshift 2024-11-21 6.5 Medium
Jenkins Subversion Plugin 2.13.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
CVE-2020-2111 2 Jenkins, Redhat 2 Subversion, Openshift 2024-11-21 5.4 Medium
Jenkins Subversion Plugin 2.13.0 and earlier does not escape the error message for the Project Repository Base URL field form validation, resulting in a stored cross-site scripting vulnerability.
CVE-2018-1000111 1 Jenkins 1 Subversion 2024-11-21 N/A
An improper authorization vulnerability exists in Jenkins Subversion Plugin version 2.10.2 and earlier in SubversionStatus.java and SubversionRepositoryStatus.java that allows an attacker with network access to obtain a list of nodes and users.
CVE-2017-1000085 2 Jenkins, Redhat 2 Subversion, Openshift 2024-11-21 N/A
Subversion Plugin connects to a user-specified Subversion repository as part of form validation (e.g. to retrieve a list of tags). This functionality improperly checked permissions, allowing any user with Item/Build permission (but not Item/Configure) to connect to any web server or Subversion server and send credentials with a known ID, thereby possibly capturing them. Additionally, this functionality did not require POST requests be used, thereby allowing the above to be performed without direct access to Jenkins via Cross-Site Request Forgery attacks.