Description
Some URLs provided by Jenkins global-build-stats plugin version 1.4 and earlier returned a JSON response that contained request parameters. These responses had the Content Type: text/html, so could have been interpreted as HTML by clients, resulting in a potential reflected cross-site scripting vulnerability. Additionally, some URLs provided by global-build-stats plugin that modify data did not require POST requests to be sent, resulting in a potential cross-site request forgery vulnerability.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-4024 | Some URLs provided by Jenkins global-build-stats plugin version 1.4 and earlier returned a JSON response that contained request parameters. These responses had the Content Type: text/html, so could have been interpreted as HTML by clients, resulting in a potential reflected cross-site scripting vulnerability. Additionally, some URLs provided by global-build-stats plugin that modify data did not require POST requests to be sent, resulting in a potential cross-site request forgery vulnerability. |
Github GHSA |
GHSA-gw8g-hh47-q4gw | Cross-Site Request Forgery (CSRF) vulnerability in Jenkins global-build-stats plugin |
References
| Link | Providers |
|---|---|
| https://jenkins.io/security/advisory/2017-10-23/ |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T22:00:41.204Z
Reserved: 2017-11-29T00:00:00.000Z
Link: CVE-2017-1000389
No data.
Status : Modified
Published: 2018-01-26T02:29:00.423
Modified: 2024-11-21T03:04:37.103
Link: CVE-2017-1000389
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA