A persisted cross-site scripting vulnerability exists in Jenkins Groovy Postbuild Plugin 2.3.1 and older in various Jelly files that allows attackers able to control build badge content to define JavaScript that would be executed in another user's browser when that other user performs some UI actions.
References
Link | Resource |
---|---|
https://jenkins.io/security/advisory/2018-05-09/#SECURITY-821 | Vendor Advisory |
https://jenkins.io/security/advisory/2018-05-09/#SECURITY-821 | Vendor Advisory |
Configurations
History
21 Nov 2024, 03:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://jenkins.io/security/advisory/2018-05-09/#SECURITY-821 - Vendor Advisory |
Information
Published : 2018-06-05 21:29
Updated : 2024-11-21 03:39
NVD link : CVE-2018-1000202
Mitre link : CVE-2018-1000202
CVE.ORG link : CVE-2018-1000202
JSON object : View
Products Affected
jenkins
- groovy_postbuild
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')