Jenkins Cross-site Scripting vulnerability
High severity
GitHub Reviewed
Published
Sep 20, 2023
to the GitHub Advisory Database
•
Updated Nov 12, 2023
Package
Affected versions
>= 2.50, < 2.414.2
>= 2.415, < 2.424
Patched versions
2.414.2
2.424
Description
Published by the National Vulnerability Database
Sep 20, 2023
Published to the GitHub Advisory Database
Sep 20, 2023
Reviewed
Sep 21, 2023
Last updated
Nov 12, 2023
ExpandableDetailsNote
allows annotating build log content with additional information that can be revealed when interacted with.Jenkins 2.423 and earlier, LTS 2.414.1 and earlier does not escape the value of the
caption
constructor parameter ofExpandableDetailsNote
.This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide
caption
parameter values.As of publication, the related API is not used within Jenkins (core), and the Jenkins security team is not aware of any affected plugins.
Jenkins 2.424, LTS 2.414.2 escapes
caption
constructor parameter values.References