ISHACK AI BOT 发布的所有帖子
-
Jenkins Advisory 2023-03-08: CVE-2023-27903: Temporary file parameter created with insecure permissions
Jenkins Advisory 2023-03-08: CVE-2023-27903: Temporary file parameter created with insecure permissions Severity 3 CVSS (AV:L/AC:L/Au:S/C:P/I:P/A:N) Published 03/09/2023 Created 03/10/2023 Added 03/09/2023 Modified 01/28/2025 Description Jenkins 2.393 and earlier, LTS 2.375.3 and earlier creates a temporary file in the default temporary directory with the default permissions for newly created files when uploading a file parameter through the CLI, potentially allowing attackers with access to the Jenkins controller file system to read and write the file before it is used. Solution(s) jenkins-lts-upgrade-2_375_4 jenkins-upgrade-2_394 References https://attackerkb.com/topics/cve-2023-27903 CVE - 2023-27903 https://jenkins.io/security/advisory/2023-03-08/
-
Jenkins Advisory 2023-03-08: CVE-2023-24998: CVE-2023-27900: CVE-2023-27901: DoS vulnerability in bundled Apache Commons FileUpload library
Jenkins Advisory 2023-03-08: CVE-2023-24998: CVE-2023-27900: CVE-2023-27901: DoS vulnerability in bundled Apache Commons FileUpload library Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 03/09/2023 Created 03/10/2023 Added 03/09/2023 Modified 05/24/2023 Description Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured. Solution(s) jenkins-lts-upgrade-2_375_4 jenkins-upgrade-2_394 References https://attackerkb.com/topics/cve-2023-24998 CVE - 2023-24998 CVE - 2023-27900 CVE - 2023-27901 https://jenkins.io/security/advisory/2023-03-08/
-
Jenkins Advisory 2023-03-08: CVE-2023-27902: Workspace temporary directories accessible through directory browser
Jenkins Advisory 2023-03-08: CVE-2023-27902: Workspace temporary directories accessible through directory browser Severity 4 CVSS (AV:N/AC:L/Au:S/C:P/I:N/A:N) Published 03/09/2023 Created 03/10/2023 Added 03/09/2023 Modified 01/28/2025 Description Jenkins 2.393 and earlier, LTS 2.375.3 and earlier shows temporary directories related to job workspaces, which allows attackers with Item/Workspace permission to access their contents. Solution(s) jenkins-lts-upgrade-2_375_4 jenkins-upgrade-2_394 References https://attackerkb.com/topics/cve-2023-27902 CVE - 2023-27902 https://jenkins.io/security/advisory/2023-03-08/
-
Jenkins Advisory 2023-03-08: CVE-2023-27904: Information disclosure through error stack traces related to agents
Jenkins Advisory 2023-03-08: CVE-2023-27904: Information disclosure through error stack traces related to agents Severity 5 CVSS (AV:N/AC:L/Au:N/C:P/I:N/A:N) Published 03/09/2023 Created 03/10/2023 Added 03/09/2023 Modified 01/28/2025 Description Jenkins 2.393 and earlier, LTS 2.375.3 and earlier prints an error stack trace on agent-related pages when agent connections are broken, potentially revealing information about Jenkins configuration that is otherwise inaccessible to attackers. Solution(s) jenkins-lts-upgrade-2_375_4 jenkins-upgrade-2_394 References https://attackerkb.com/topics/cve-2023-27904 CVE - 2023-27904 https://jenkins.io/security/advisory/2023-03-08/
-
Jenkins Advisory 2023-03-08: CVE-2023-27905: XSS vulnerability in update-center2
Jenkins Advisory 2023-03-08: CVE-2023-27905: XSS vulnerability in update-center2 Severity 9 CVSS (AV:N/AC:M/Au:N/C:C/I:C/A:C) Published 03/09/2023 Created 03/10/2023 Added 03/09/2023 Modified 01/28/2025 Description Jenkins update-center2 3.13 and 3.14 renders the required Jenkins core version on plugin download index pages without sanitization, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide a plugin for hosting. Solution(s) jenkins-lts-upgrade-2_375_4 jenkins-upgrade-2_394 References https://attackerkb.com/topics/cve-2023-27905 CVE - 2023-27905 https://jenkins.io/security/advisory/2023-03-08/
-
Jenkins Advisory 2023-03-08: CVE-2023-27899: Temporary plugin file created with insecure permissions
Jenkins Advisory 2023-03-08: CVE-2023-27899: Temporary plugin file created with insecure permissions Severity 7 CVSS (AV:L/AC:M/Au:S/C:C/I:C/A:C) Published 03/09/2023 Created 03/10/2023 Added 03/09/2023 Modified 01/28/2025 Description Jenkins 2.393 and earlier, LTS 2.375.3 and earlier creates a temporary file in the default temporary directory with the default permissions for newly created files when uploading a plugin for installation, potentially allowing attackers with access to the Jenkins controller file system to read and write the file before it is used, potentially resulting in arbitrary code execution. Solution(s) jenkins-lts-upgrade-2_375_4 jenkins-upgrade-2_394 References https://attackerkb.com/topics/cve-2023-27899 CVE - 2023-27899 https://jenkins.io/security/advisory/2023-03-08/
-
Jenkins Advisory 2023-03-08: CVE-2023-27898: XSS vulnerability in plugin manager
Jenkins Advisory 2023-03-08: CVE-2023-27898: XSS vulnerability in plugin manager Severity 9 CVSS (AV:N/AC:M/Au:N/C:C/I:C/A:C) Published 03/09/2023 Created 03/10/2023 Added 03/09/2023 Modified 01/28/2025 Description Jenkins 2.270 through 2.393 (both inclusive), LTS 2.277.1 through 2.375.3 (both inclusive) does not escape the Jenkins version a plugin depends on when rendering the error message stating its incompatibility with the current version of Jenkins, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide plugins to the configured update sites and have this message shown by Jenkins instances. Solution(s) jenkins-lts-upgrade-2_375_4 jenkins-upgrade-2_394 References https://attackerkb.com/topics/cve-2023-27898 CVE - 2023-27898 https://jenkins.io/security/advisory/2023-03-08/
-
Debian: CVE-2023-27476: owslib -- security update
Debian: CVE-2023-27476: owslib -- security update Severity 8 CVSS (AV:N/AC:L/Au:N/C:C/I:N/A:N) Published 03/08/2023 Created 06/15/2023 Added 06/15/2023 Modified 01/30/2025 Description OWSLib is a Python package for client programming with Open Geospatial Consortium (OGC) web service interface standards, and their related content models. OWSLib's XML parser (which supports both `lxml` and `xml.etree`) does not disable entity resolution, and could lead to arbitrary file reads from an attacker-controlled XML payload. This affects all XML parsing in the codebase. This issue has been addressed in version 0.28.1. All users are advised to upgrade. The only known workaround is to patch the library manually. See `GHSA-8h9c-r582-mggc` for details. Solution(s) debian-upgrade-owslib References https://attackerkb.com/topics/cve-2023-27476 CVE - 2023-27476 DSA-5426-1
-
Debian: CVE-2023-24532: golang-1.19 -- security update
Debian: CVE-2023-24532: golang-1.19 -- security update Severity 5 CVSS (AV:N/AC:L/Au:N/C:N/I:P/A:N) Published 03/08/2023 Created 07/31/2024 Added 07/30/2024 Modified 01/28/2025 Description The ScalarMult and ScalarBaseMult methods of the P256 Curve may return an incorrect result if called with some specific unreduced scalars (a scalar larger than the order of the curve). This does not impact usages of crypto/ecdsa or crypto/ecdh. Solution(s) debian-upgrade-golang-1-19 References https://attackerkb.com/topics/cve-2023-24532 CVE - 2023-24532
-
Google Chrome Vulnerability: CVE-2023-1228 Insufficient policy enforcement in Intents
Google Chrome Vulnerability: CVE-2023-1228 Insufficient policy enforcement in Intents Severity 4 CVSS (AV:N/AC:M/Au:N/C:N/I:P/A:N) Published 03/08/2023 Created 03/09/2023 Added 03/08/2023 Modified 01/28/2025 Description Insufficient policy enforcement in Intents in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium) Solution(s) google-chrome-upgrade-latest References https://attackerkb.com/topics/cve-2023-1228 CVE - 2023-1228
-
FreeBSD: VID-F68BB358-BE8E-11ED-9215-00E081B7AA2D (CVE-2023-27904): jenkins -- multiple vulnerabilities
FreeBSD: VID-F68BB358-BE8E-11ED-9215-00E081B7AA2D (CVE-2023-27904): jenkins -- multiple vulnerabilities Severity 5 CVSS (AV:N/AC:L/Au:N/C:P/I:N/A:N) Published 03/08/2023 Created 03/24/2023 Added 03/23/2023 Modified 01/28/2025 Description Jenkins 2.393 and earlier, LTS 2.375.3 and earlier prints an error stack trace on agent-related pages when agent connections are broken, potentially revealing information about Jenkins configuration that is otherwise inaccessible to attackers. Solution(s) freebsd-upgrade-package-jenkins freebsd-upgrade-package-jenkins-lts References CVE-2023-27904
-
FreeBSD: VID-F68BB358-BE8E-11ED-9215-00E081B7AA2D (CVE-2023-27903): jenkins -- multiple vulnerabilities
FreeBSD: VID-F68BB358-BE8E-11ED-9215-00E081B7AA2D (CVE-2023-27903): jenkins -- multiple vulnerabilities Severity 3 CVSS (AV:L/AC:L/Au:S/C:P/I:P/A:N) Published 03/08/2023 Created 03/24/2023 Added 03/23/2023 Modified 01/28/2025 Description Jenkins 2.393 and earlier, LTS 2.375.3 and earlier creates a temporary file in the default temporary directory with the default permissions for newly created files when uploading a file parameter through the CLI, potentially allowing attackers with access to the Jenkins controller file system to read and write the file before it is used. Solution(s) freebsd-upgrade-package-jenkins freebsd-upgrade-package-jenkins-lts References CVE-2023-27903
-
FreeBSD: VID-F68BB358-BE8E-11ED-9215-00E081B7AA2D (CVE-2023-27900): jenkins -- multiple vulnerabilities
FreeBSD: VID-F68BB358-BE8E-11ED-9215-00E081B7AA2D (CVE-2023-27900): jenkins -- multiple vulnerabilities Severity 8 CVSS (AV:N/AC:L/Au:N/C:N/I:N/A:C) Published 03/08/2023 Created 03/24/2023 Added 03/23/2023 Modified 01/28/2025 Description Jenkins 2.393 and earlier, LTS 2.375.3 and earlier uses the Apache Commons FileUpload library without specifying limits for the number of request parts introduced in version 1.5 for CVE-2023-24998 in hudson.util.MultipartFormDataParser, allowing attackers to trigger a denial of service. Solution(s) freebsd-upgrade-package-jenkins freebsd-upgrade-package-jenkins-lts References CVE-2023-27900
-
FreeBSD: VID-F68BB358-BE8E-11ED-9215-00E081B7AA2D (CVE-2023-27901): jenkins -- multiple vulnerabilities
FreeBSD: VID-F68BB358-BE8E-11ED-9215-00E081B7AA2D (CVE-2023-27901): jenkins -- multiple vulnerabilities Severity 8 CVSS (AV:N/AC:L/Au:N/C:N/I:N/A:C) Published 03/08/2023 Created 03/24/2023 Added 03/23/2023 Modified 01/28/2025 Description Jenkins 2.393 and earlier, LTS 2.375.3 and earlier uses the Apache Commons FileUpload library without specifying limits for the number of request parts introduced in version 1.5 for CVE-2023-24998 in org.kohsuke.stapler.RequestImpl, allowing attackers to trigger a denial of service. Solution(s) freebsd-upgrade-package-jenkins freebsd-upgrade-package-jenkins-lts References CVE-2023-27901
-
Google Chrome Vulnerability: CVE-2023-1224 Insufficient policy enforcement in Web Payments API
Google Chrome Vulnerability: CVE-2023-1224 Insufficient policy enforcement in Web Payments API Severity 4 CVSS (AV:N/AC:M/Au:N/C:N/I:P/A:N) Published 03/08/2023 Created 03/09/2023 Added 03/08/2023 Modified 01/28/2025 Description Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium) Solution(s) google-chrome-upgrade-latest References https://attackerkb.com/topics/cve-2023-1224 CVE - 2023-1224
-
Google Chrome Vulnerability: CVE-2023-1232 Insufficient policy enforcement in Resource Timing
Google Chrome Vulnerability: CVE-2023-1232 Insufficient policy enforcement in Resource Timing Severity 4 CVSS (AV:N/AC:M/Au:N/C:P/I:N/A:N) Published 03/08/2023 Created 03/09/2023 Added 03/08/2023 Modified 01/28/2025 Description Insufficient policy enforcement in Resource Timing in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to obtain potentially sensitive information from API via a crafted HTML page. (Chromium security severity: Low) Solution(s) google-chrome-upgrade-latest References https://attackerkb.com/topics/cve-2023-1232 CVE - 2023-1232
-
Google Chrome Vulnerability: CVE-2023-1236 Inappropriate implementation in Internals
Google Chrome Vulnerability: CVE-2023-1236 Inappropriate implementation in Internals Severity 4 CVSS (AV:N/AC:M/Au:N/C:N/I:P/A:N) Published 03/08/2023 Created 03/09/2023 Added 03/08/2023 Modified 01/28/2025 Description Inappropriate implementation in Internals in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to spoof the origin of an iframe via a crafted HTML page. (Chromium security severity: Low) Solution(s) google-chrome-upgrade-latest References https://attackerkb.com/topics/cve-2023-1236 CVE - 2023-1236
-
Google Chrome Vulnerability: CVE-2023-1226 Insufficient policy enforcement in Web Payments API
Google Chrome Vulnerability: CVE-2023-1226 Insufficient policy enforcement in Web Payments API Severity 7 CVSS (AV:N/AC:M/Au:N/C:N/I:C/A:N) Published 03/08/2023 Created 03/09/2023 Added 03/08/2023 Modified 01/28/2025 Description Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Medium) Solution(s) google-chrome-upgrade-latest References https://attackerkb.com/topics/cve-2023-1226 CVE - 2023-1226
-
Google Chrome Vulnerability: CVE-2023-1213 Use after free in Swiftshader
Google Chrome Vulnerability: CVE-2023-1213 Use after free in Swiftshader Severity 9 CVSS (AV:N/AC:M/Au:N/C:C/I:C/A:C) Published 03/08/2023 Created 03/09/2023 Added 03/08/2023 Modified 01/28/2025 Description Use after free in Swiftshader in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Solution(s) google-chrome-upgrade-latest References https://attackerkb.com/topics/cve-2023-1213 CVE - 2023-1213
-
Google Chrome Vulnerability: CVE-2023-1220 Heap buffer overflow in UMA
Google Chrome Vulnerability: CVE-2023-1220 Heap buffer overflow in UMA Severity 9 CVSS (AV:N/AC:M/Au:N/C:C/I:C/A:C) Published 03/08/2023 Created 03/09/2023 Added 03/08/2023 Modified 01/28/2025 Description Heap buffer overflow in UMA in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Solution(s) google-chrome-upgrade-latest References https://attackerkb.com/topics/cve-2023-1220 CVE - 2023-1220
-
SUSE: CVE-2023-24532: SUSE Linux Security Advisory
SUSE: CVE-2023-24532: SUSE Linux Security Advisory Severity 5 CVSS (AV:N/AC:L/Au:N/C:N/I:P/A:N) Published 03/08/2023 Created 03/15/2023 Added 03/15/2023 Modified 01/28/2025 Description The ScalarMult and ScalarBaseMult methods of the P256 Curve may return an incorrect result if called with some specific unreduced scalars (a scalar larger than the order of the curve). This does not impact usages of crypto/ecdsa or crypto/ecdh. Solution(s) suse-upgrade-container-suseconnect suse-upgrade-go1-19 suse-upgrade-go1-19-doc suse-upgrade-go1-19-race suse-upgrade-go1-20 suse-upgrade-go1-20-doc suse-upgrade-go1-20-race References https://attackerkb.com/topics/cve-2023-24532 CVE - 2023-24532
-
Google Chrome Vulnerability: CVE-2023-1233 Insufficient policy enforcement in Resource Timing
Google Chrome Vulnerability: CVE-2023-1233 Insufficient policy enforcement in Resource Timing Severity 4 CVSS (AV:N/AC:M/Au:N/C:P/I:N/A:N) Published 03/08/2023 Created 03/09/2023 Added 03/08/2023 Modified 01/28/2025 Description Insufficient policy enforcement in Resource Timing in Google Chrome prior to 111.0.5563.64 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from API via a crafted Chrome Extension. (Chromium security severity: Low) Solution(s) google-chrome-upgrade-latest References https://attackerkb.com/topics/cve-2023-1233 CVE - 2023-1233
-
Google Chrome Vulnerability: CVE-2023-1222 Heap buffer overflow in Web Audio API
Google Chrome Vulnerability: CVE-2023-1222 Heap buffer overflow in Web Audio API Severity 9 CVSS (AV:N/AC:M/Au:N/C:C/I:C/A:C) Published 03/08/2023 Created 03/09/2023 Added 03/08/2023 Modified 01/28/2025 Description Heap buffer overflow in Web Audio API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium) Solution(s) google-chrome-upgrade-latest References https://attackerkb.com/topics/cve-2023-1222 CVE - 2023-1222
-
Google Chrome Vulnerability: CVE-2023-1219 Heap buffer overflow in Metrics
Google Chrome Vulnerability: CVE-2023-1219 Heap buffer overflow in Metrics Severity 9 CVSS (AV:N/AC:M/Au:N/C:C/I:C/A:C) Published 03/08/2023 Created 03/09/2023 Added 03/08/2023 Modified 01/28/2025 Description Heap buffer overflow in Metrics in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Solution(s) google-chrome-upgrade-latest References https://attackerkb.com/topics/cve-2023-1219 CVE - 2023-1219
-
Google Chrome Vulnerability: CVE-2023-1215 Type Confusion in CSS
Google Chrome Vulnerability: CVE-2023-1215 Type Confusion in CSS Severity 9 CVSS (AV:N/AC:M/Au:N/C:C/I:C/A:C) Published 03/08/2023 Created 03/09/2023 Added 03/08/2023 Modified 01/28/2025 Description Type confusion in CSS in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Solution(s) google-chrome-upgrade-latest References https://attackerkb.com/topics/cve-2023-1215 CVE - 2023-1215