The f:validateButton form control for the Jenkins UI did not properly escape job URLs in Jenkins 2.171 and earlier and Jenkins LTS 2.164.1 and earlier, resulting in a cross-site scripting (XSS) vulnerability exploitable by users with the ability to control job names.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/107889 | vdb entry broken link |
https://access.redhat.com/errata/RHBA-2019:1605 | third party advisory vendor advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | third party advisory patch |
https://jenkins.io/security/advisory/2019-04-10/#SECURITY-1327 | vendor advisory |