A reflected cross-site scripting vulnerability exists in Jenkins Job Config History Plugin 2.18 and earlier in all Jelly files that shows arbitrary attacker-specified HTML in Jenkins to users with Job/Configure access.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://jenkins.io/security/advisory/2018-09-25/#SECURITY-1130 | third party advisory |
http://www.securityfocus.com/bid/106532 | third party advisory vdb entry |