A stored cross site scripting vulnerability in Jenkins ElectricFlow Plugin 1.1.5 and earlier allowed attackers able to configure jobs in Jenkins or control the output of the ElectricFlow API to inject arbitrary HTML and JavaScript in the plugin-provided output on build status pages.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2019/06/11/1 | third party advisory mailing list |
http://www.securityfocus.com/bid/108747 | vdb entry |
https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1412 | vendor advisory |