Jenkins HTML Publisher Plugin 1.20 and earlier did not escape the project and build display names in the HTML report frame, resulting in a cross-site scripting vulnerability exploitable by users able to change those.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://jenkins.io/security/advisory/2019-10-01/#SECURITY-1590 | vendor advisory |
http://www.openwall.com/lists/oss-security/2019/10/01/2 | third party advisory mailing list |
https://access.redhat.com/errata/RHSA-2019:4097 | vendor advisory |
https://access.redhat.com/errata/RHSA-2019:4055 | vendor advisory |
https://access.redhat.com/errata/RHSA-2019:4089 | vendor advisory |