An cross-site scripting vulnerability exists in Jenkins Config File Provider Plugin 3.4.1 and earlier in src/main/resources/lib/configfiles/configfiles.jelly that allows attackers with permission to define shared configuration files to execute arbitrary JavaScript when a user attempts to delete the shared configuration file.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://jenkins.io/security/advisory/2019-01-28/#SECURITY-1253 | vendor advisory |
https://access.redhat.com/errata/RHBA-2019:0326 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHBA-2019:0327 | third party advisory vendor advisory |