Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Open_build_service
(Opensuse)Repositories |
• https://github.com/openSUSE/open-build-service
• https://github.com/openSUSE/obs-service-set_version |
#Vulnerabilities | 22 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2021-02-11 | CVE-2020-8031 | A Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Open Build Service allows remote attackers to store JS code in markdown that is not properly escaped, impacting confidentiality and integrity. This issue affects: Open Build Service versions prior to 2.10.8. | Open_build_service | 5.4 | ||
2022-03-09 | CVE-2021-36777 | A Reliance on Untrusted Inputs in a Security Decision vulnerability in the login proxy of the openSUSE Build service allowed attackers to present users with a expected login form that then sends the clear text credentials to an attacker specified server. This issue affects: openSUSE Build service login-proxy-scripts versions prior to dc000cdfe9b9b715fb92195b1a57559362f689ef. | Open_build_service | 8.8 | ||
2022-05-03 | CVE-2022-21949 | A Improper Restriction of XML External Entity Reference vulnerability in SUSE Open Build Service allows remote attackers to reference external entities in certain operations. This can be used to gain information from the server that can be abused to escalate to Admin privileges on OBS. This issue affects: SUSE Open Build Service Open Build Service versions prior to 2.10.13. | Open_build_service | 8.8 | ||
2018-03-01 | CVE-2017-5188 | The bs_worker code in open build service before 20170320 followed relative symlinks, allowing reading of files outside of the package source directory during build, allowing leakage of private information. | Open_build_service | 7.5 | ||
2018-03-01 | CVE-2017-9268 | In the open build service before 201707022 the wipetrigger and rebuild actions checked the wrong project for permissions, allowing authenticated users to cause operations on projects where they did not have permissions leading to denial of service (resource consumption). | Open_build_service | 6.5 | ||
2018-03-20 | CVE-2011-3178 | In the web ui of the openbuildservice before 2.3.0 a code injection of the project rebuildtimes statistics could be used by authorized attackers to execute shellcode. | Open_build_service | 8.8 | ||
2018-06-07 | CVE-2018-7688 | A missing permission check in the review handling of openSUSE Open Build Service before 2.9.3 allowed all authenticated users to modify sources in projects where they do not have write permissions. | Open_build_service | 6.5 | ||
2018-06-07 | CVE-2018-7689 | Lack of permission checks in the InitializeDevelPackage function in openSUSE Open Build Service before 2.9.3 allowed authenticated users to modify packages where they do not have write permissions. | Open_build_service | 6.5 | ||
2018-06-08 | CVE-2013-3703 | The controller of the Open Build Service API prior to version 2.4.4 is missing a write permission check, allowing an authenticated attacker to add or remove user roles from packages and/or project meta data. | Open_build_service | 6.5 | ||
2018-06-08 | CVE-2014-0593 | The set_version script as shipped with obs-service-set_version is a source validator for the Open Build Service (OBS). In versions prior to 0.5.3-1.1 this script did not properly sanitize the input provided by the user, allowing for code execution on the executing server. | Open_build_service | 9.8 |