The Details view of some Static Analysis Utilities based plugins, was vulnerable to a persisted cross-site scripting vulnerability: Malicious users able to influence the input to these plugins, for example the console output which is parsed to extract build warnings (Warnings Plugin), could insert arbitrary HTML into this view.
References
Link | Resource |
---|---|
https://jenkins.io/security/advisory/2017-08-07/ | Vendor Advisory |
http://www.securityfocus.com/bid/101061 | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2017-10-04 18:29
Updated : 2017-11-01 12:08
NVD link : CVE-2017-1000102
Mitre link : CVE-2017-1000102
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
jenkins
- static_analysis_utilities