Cross-site scripting (XSS) vulnerability in Jenkins Core in Jenkins before 1.438, and 1.409 LTS before 1.409.3 LTS, when a stand-alone container is used, allows remote attackers to inject arbitrary web script or HTML via vectors related to error messages.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://openwall.com/lists/oss-security/2011/11/23/6 | patch mailing list |
http://www.securityfocus.com/bid/50786 | vdb entry |
http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2011-11-08.cb | patch vendor advisory |
http://openwall.com/lists/oss-security/2011/11/23/5 | patch mailing list |
https://github.com/jenkinsci/winstone/commit/410ed3001d51c689cf59085b7417466caa2ded7b.patch | patch |
http://secunia.com/advisories/46911 | third party advisory |
http://groups.google.com/group/jenkinsci-advisories/msg/1b94588f90f876b5?dmode=source&output=gplain | mailing list |