First published: Wed Oct 04 2017(Updated: )
The Details view of some Static Analysis Utilities based plugins, was vulnerable to a persisted cross-site scripting vulnerability: Malicious users able to influence the input to these plugins, for example the console output which is parsed to extract build warnings (Warnings Plugin), could insert arbitrary HTML into this view.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Static Analysis Utilities | <=1.91 | |
maven/org.jvnet.hudson.plugins:analysis-core | <=1.91 | 1.92 |
<=1.91 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-1000102 has a medium severity rating due to its potential for cross-site scripting attacks.
To fix CVE-2017-1000102, upgrade Jenkins Static Analysis Utilities to version 1.92 or later.
CVE-2017-1000102 affects the Static Analysis Utilities based plugins in Jenkins.
Yes, if exploited, CVE-2017-1000102 could allow an attacker to execute scripts in the context of the affected user's session.
CVE-2017-1000102 can facilitate persistent cross-site scripting attacks by allowing malicious users to inject scripts through plugin inputs.