The custom Details view of the Static Analysis Utilities based OWASP Dependency-Check Plugin, was vulnerable to a persisted cross-site scripting vulnerability: Malicious users able to influence the input to this plugin could insert arbitrary HTML into this view.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/100227 | Third Party Advisory VDB Entry |
https://jenkins.io/security/advisory/2017-08-07/ | Vendor Advisory |
http://www.securityfocus.com/bid/100227 | Third Party Advisory VDB Entry |
https://jenkins.io/security/advisory/2017-08-07/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/100227 - Third Party Advisory, VDB Entry | |
References | () https://jenkins.io/security/advisory/2017-08-07/ - Vendor Advisory |
Information
Published : 2017-10-05 01:29
Updated : 2024-11-21 03:04
NVD link : CVE-2017-1000109
Mitre link : CVE-2017-1000109
CVE.ORG link : CVE-2017-1000109
JSON object : View
Products Affected
jenkins
- owasp_dependency-check
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')