A stored cross-site scripting vulnerability in Jenkins 2.191 and earlier, LTS 2.176.2 and earlier allowed attackers with Overall/Administer permission to configure the update site URL to inject arbitrary HTML and JavaScript in update center web pages.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2019/08/28/4 | third party advisory mailing list |
https://access.redhat.com/errata/RHSA-2019:2789 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2019:3144 | third party advisory vendor advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | third party advisory patch |
https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1453 | vendor advisory |