The f:validateButton form control for the Jenkins UI did not properly escape job URLs in Jenkins 2.171 and earlier and Jenkins LTS 2.164.1 and earlier, resulting in a cross-site scripting (XSS) vulnerability exploitable by users with the ability to control job names.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/107889 | Broken Link |
https://access.redhat.com/errata/RHBA-2019:1605 | Third Party Advisory |
https://jenkins.io/security/advisory/2019-04-10/#SECURITY-1327 | Vendor Advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2019-04-10 21:29
Updated : 2024-02-28 17:08
NVD link : CVE-2019-1003050
Mitre link : CVE-2019-1003050
CVE.ORG link : CVE-2019-1003050
JSON object : View
Products Affected
oracle
- communications_cloud_native_core_automated_test_suite
jenkins
- jenkins
redhat
- openshift_container_platform
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')