The f:validateButton form control for the Jenkins UI did not properly escape job URLs in Jenkins 2.171 and earlier and Jenkins LTS 2.164.1 and earlier, resulting in a cross-site scripting (XSS) vulnerability exploitable by users with the ability to control job names.
References
Link | Resource |
---|---|
https://jenkins.io/security/advisory/2019-04-10/#SECURITY-1327 | Vendor Advisory |
http://www.securityfocus.com/bid/107889 | Broken Link |
https://access.redhat.com/errata/RHBA-2019:1605 | Third Party Advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2019-04-10 14:29
Updated : 2022-06-13 11:46
NVD link : CVE-2019-1003050
Mitre link : CVE-2019-1003050
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
redhat
- openshift_container_platform
oracle
- communications_cloud_native_core_automated_test_suite
jenkins
- jenkins