A persisted cross-site scripting vulnerability exists in Jenkins Groovy Postbuild Plugin 2.3.1 and older in various Jelly files that allows attackers able to control build badge content to define JavaScript that would be executed in another user's browser when that other user performs some UI actions.
References
Link | Resource |
---|---|
https://jenkins.io/security/advisory/2018-05-09/#SECURITY-821 | Vendor Advisory |
Configurations
Information
Published : 2018-06-05 14:29
Updated : 2018-07-18 12:51
NVD link : CVE-2018-1000202
Mitre link : CVE-2018-1000202
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
jenkins
- groovy_postbuild