The Details view of some Static Analysis Utilities based plugins, was vulnerable to a persisted cross-site scripting vulnerability: Malicious users able to influence the input to these plugins, for example the console output which is parsed to extract build warnings (Warnings Plugin), could insert arbitrary HTML into this view.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/101061 | Third Party Advisory VDB Entry |
https://jenkins.io/security/advisory/2017-08-07/ | Vendor Advisory |
http://www.securityfocus.com/bid/101061 | Third Party Advisory VDB Entry |
https://jenkins.io/security/advisory/2017-08-07/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 03:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/101061 - Third Party Advisory, VDB Entry | |
References | () https://jenkins.io/security/advisory/2017-08-07/ - Vendor Advisory |
Information
Published : 2017-10-05 01:29
Updated : 2024-11-21 03:04
NVD link : CVE-2017-1000102
Mitre link : CVE-2017-1000102
CVE.ORG link : CVE-2017-1000102
JSON object : View
Products Affected
jenkins
- static_analysis_utilities
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')