Description
Jenkins 2.88 and earlier; 2.73.2 and earlier Autocompletion suggestions for text fields were not escaped, resulting in a persisted cross-site scripting vulnerability if the source for the suggestions allowed specifying text that includes HTML metacharacters like less-than and greater-than characters.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-2631 | Jenkins 2.88 and earlier; 2.73.2 and earlier Autocompletion suggestions for text fields were not escaped, resulting in a persisted cross-site scripting vulnerability if the source for the suggestions allowed specifying text that includes HTML metacharacters like less-than and greater-than characters. |
Github GHSA |
GHSA-5ppx-rgw2-xg23 | Improper Neutralization of Input During Web Page Generation in Jenkins |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T22:00:40.966Z
Reserved: 2017-11-29T00:00:00.000Z
Link: CVE-2017-1000392
No data.
Status : Modified
Published: 2018-01-26T02:29:00.610
Modified: 2024-11-21T03:04:37.567
Link: CVE-2017-1000392
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA