Cross-site Scripting (XSS) Affecting org.jenkins-ci.main:jenkins-core package, versions [2.110,2.116) [2.107.0,2.107.2)
Threat Intelligence
EPSS
0.05% (24th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGJENKINSCIMAIN-32222
- published 16 Apr 2018
- disclosed 15 Apr 2018
- credit Jesper den Boer
Introduced: 15 Apr 2018
CVE-2018-1000170 Open this link in a new tabHow to fix?
Upgrade org.jenkins-ci.main:jenkins-core
to version 2.116, 2.107.2 or higher.
Overview
org.jenkins-ci.main:jenkins-core is an open-source automation server.
Affected versions of this package are vulnerable to Cross-site Scripting (XSS) attacks via the confirmationList.jelly
and stopButton.jelly
methods. It allows attackers with Job/Configure
and/or Job/Create
permission to create an item name containing JavaScript that would be executed in another user's browser when that other user performs some UI actions.
Details
<
References
CVSS Scores
version 3.1