Описание
Jenkins Cross-site Scripting vulnerability
ExpandableDetailsNote allows annotating build log content with additional information that can be revealed when interacted with.
Jenkins 2.423 and earlier, LTS 2.414.1 and earlier does not escape the value of the caption constructor parameter of ExpandableDetailsNote.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide caption parameter values.
As of publication, the related API is not used within Jenkins (core), and the Jenkins security team is not aware of any affected plugins.
Jenkins 2.424, LTS 2.414.2 escapes caption constructor parameter values.
Пакеты
org.jenkins-ci.main:jenkins-core
>= 2.50, < 2.414.2
2.414.2
org.jenkins-ci.main:jenkins-core
>= 2.415, < 2.424
2.424
Связанные уязвимости
Jenkins 2.423 and earlier, LTS 2.414.1 and earlier does not escape the value of the 'caption' constructor parameter of 'ExpandableDetailsNote', resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control this parameter.
Jenkins 2.423 and earlier, LTS 2.414.1 and earlier does not escape the value of the 'caption' constructor parameter of 'ExpandableDetailsNote', resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control this parameter.
Jenkins 2.423 and earlier, LTS 2.414.1 and earlier does not escape the ...
Уязвимость сервера автоматизации Jenkins, связанная с неправильной нейтрализация ввода во время создания веб-страницы, позволяющая нарушителю осуществлять атаки с использованием межсайтовых сценариев (XSS) с возможностью управления файлами в рабочих областях