First published: Fri Apr 13 2018(Updated: )
A cross-site scripting vulnerability exists in Jenkins 2.115 and older, LTS 2.107.1 and older, in confirmationList.jelly and stopButton.jelly that allows attackers with Job/Configure and/or Job/Create permission to create an item name containing JavaScript that would be executed in another user's browser when that other user performs some UI actions.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Jenkins | <=2.105 | |
Jenkins Jenkins | <=2.107.1 | |
maven/org.jenkins-ci.main:jenkins-core | <=2.107.1 | 2.107.2 |
maven/org.jenkins-ci.main:jenkins-core | >=2.108<=2.115 | 2.116 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000170 is classified as a moderate severity cross-site scripting vulnerability.
To mitigate CVE-2018-1000170, upgrade to Jenkins version 2.107.2 or newer.
Jenkins versions 2.115 and older, as well as LTS versions 2.107.1 and older, are affected by CVE-2018-1000170.
CVE-2018-1000170 is a cross-site scripting (XSS) vulnerability.
Attackers with Job/Configure and/or Job/Create permissions can exploit CVE-2018-1000170.