The f:validateButton form control for the Jenkins UI did not properly escape job URLs in Jenkins 2.171 and earlier and Jenkins LTS 2.164.1 and earlier, resulting in a cross-site scripting (XSS) vulnerability exploitable by users with the ability to control job names.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/107889 | Broken Link |
https://access.redhat.com/errata/RHBA-2019:1605 | Third Party Advisory |
https://jenkins.io/security/advisory/2019-04-10/#SECURITY-1327 | Vendor Advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
http://www.securityfocus.com/bid/107889 | Broken Link |
https://access.redhat.com/errata/RHBA-2019:1605 | Third Party Advisory |
https://jenkins.io/security/advisory/2019-04-10/#SECURITY-1327 | Vendor Advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 04:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/107889 - Broken Link | |
References | () https://access.redhat.com/errata/RHBA-2019:1605 - Third Party Advisory | |
References | () https://jenkins.io/security/advisory/2019-04-10/#SECURITY-1327 - Vendor Advisory | |
References | () https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory |
Information
Published : 2019-04-10 21:29
Updated : 2024-11-21 04:17
NVD link : CVE-2019-1003050
Mitre link : CVE-2019-1003050
CVE.ORG link : CVE-2019-1003050
JSON object : View
Products Affected
oracle
- communications_cloud_native_core_automated_test_suite
redhat
- openshift_container_platform
jenkins
- jenkins
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')