Description
A cross-site scripting vulnerability exists in Jenkins 2.115 and older, LTS 2.107.1 and older, in confirmationList.jelly and stopButton.jelly that allows attackers with Job/Configure and/or Job/Create permission to create an item name containing JavaScript that would be executed in another user's browser when that other user performs some UI actions.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-3401 | A cross-site scripting vulnerability exists in Jenkins 2.115 and older, LTS 2.107.1 and older, in confirmationList.jelly and stopButton.jelly that allows attackers with Job/Configure and/or Job/Create permission to create an item name containing JavaScript that would be executed in another user's browser when that other user performs some UI actions. |
Github GHSA |
GHSA-9jcv-v4jp-w3cq | Cross-site Scripting in Jenkins Core |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T12:33:49.415Z
Reserved: 2018-04-11T00:00:00.000Z
Link: CVE-2018-1000170
No data.
Status : Modified
Published: 2018-04-16T09:58:09.040
Modified: 2024-11-21T03:39:50.630
Link: CVE-2018-1000170
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA