A cross-site scripting vulnerability exists in Jenkins Rebuilder Plugin 1.28 and earlier in RebuildAction/BooleanParameterValue.jelly, RebuildAction/ExtendedChoiceParameterValue.jelly, RebuildAction/FileParameterValue.jelly, RebuildAction/LabelParameterValue.jelly, RebuildAction/ListSubversionTagsParameterValue.jelly, RebuildAction/MavenMetadataParameterValue.jelly, RebuildAction/NodeParameterValue.jelly, RebuildAction/PasswordParameterValue.jelly, RebuildAction/RandomStringParameterValue.jelly, RebuildAction/RunParameterValue.jelly, RebuildAction/StringParameterValue.jelly, RebuildAction/TextParameterValue.jelly, RebuildAction/ValidatingStringParameterValue.jelly that allows users with Job/Configuration permission to insert arbitrary HTML into rebuild forms.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/106532 | Third Party Advisory VDB Entry |
https://jenkins.io/security/advisory/2018-09-25/#SECURITY-130 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2019-01-09 23:29
Updated : 2024-02-28 16:48
NVD link : CVE-2018-1000415
Mitre link : CVE-2018-1000415
CVE.ORG link : CVE-2018-1000415
JSON object : View
Products Affected
rebuild_project
- rebuild
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')