A cross-site scripting vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in the Stapler web framework's org/kohsuke/stapler/Stapler.java that allows attackers with the ability to control the existence of some URLs in Jenkins to define JavaScript that would be executed in another user's browser when that other user views HTTP 404 error pages while Stapler debug mode is enabled.
References
Link | Resource |
---|---|
https://jenkins.io/security/advisory/2018-07-18/#SECURITY-390 | Vendor Advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
https://jenkins.io/security/advisory/2018-07-18/#SECURITY-390 | Vendor Advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 03:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://jenkins.io/security/advisory/2018-07-18/#SECURITY-390 - Vendor Advisory | |
References | () https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory |
Information
Published : 2018-07-23 19:29
Updated : 2024-11-21 03:57
NVD link : CVE-2018-1999007
Mitre link : CVE-2018-1999007
CVE.ORG link : CVE-2018-1999007
JSON object : View
Products Affected
jenkins
- jenkins
oracle
- communications_cloud_native_core_automated_test_suite
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')