Description
The Jenkins Delivery Pipeline Plugin version 1.0.7 and earlier used the unescaped content of the query parameter 'fullscreen' in its JavaScript, resulting in a cross-site scripting vulnerability through specially crafted URLs.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-3870 | The Jenkins Delivery Pipeline Plugin version 1.0.7 and earlier used the unescaped content of the query parameter 'fullscreen' in its JavaScript, resulting in a cross-site scripting vulnerability through specially crafted URLs. |
Github GHSA |
GHSA-g364-c7w5-93wh | Jenkins Delivery Pipeline Plugin Cross-site Scripting vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T22:00:40.929Z
Reserved: 2017-11-29T00:00:00.000Z
Link: CVE-2017-1000404
No data.
Status : Modified
Published: 2018-01-26T02:29:01.393
Modified: 2024-11-21T03:04:39.420
Link: CVE-2017-1000404
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA