First published: Fri Oct 10 2014(Updated: )
Cross-site scripting (XSS) vulnerability in the Monitoring plugin before 1.53.0 for Jenkins allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins External Monitor Job Type | <=1.52.1 | |
Jenkins External Monitor Job Type | =1.40.0 | |
Jenkins External Monitor Job Type | =1.41.0 | |
Jenkins External Monitor Job Type | =1.42.0 | |
Jenkins External Monitor Job Type | =1.43.0 | |
Jenkins External Monitor Job Type | =1.44.0 | |
Jenkins External Monitor Job Type | =1.45.0 | |
Jenkins External Monitor Job Type | =1.46.0 | |
Jenkins External Monitor Job Type | =1.47.0 | |
Jenkins External Monitor Job Type | =1.48.0 | |
Jenkins External Monitor Job Type | =1.49.0 | |
Jenkins External Monitor Job Type | =1.50.0 | |
Jenkins External Monitor Job Type | =1.51.0 | |
Jenkins External Monitor Job Type | =1.52.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3678 has a medium severity rating due to its cross-site scripting (XSS) vulnerability that could allow attackers to inject malicious scripts.
To fix CVE-2014-3678, upgrade the Jenkins Monitoring plugin to version 1.53.0 or later.
CVE-2014-3678 affects various versions of the Jenkins Monitoring plugin prior to 1.53.0.
The impact of CVE-2014-3678 includes the potential for remote attackers to execute arbitrary web scripts or HTML in the context of the affected application.
Yes, CVE-2014-3678 can potentially be exploited by unauthenticated remote attackers, increasing its risk.