First published: Tue May 08 2018(Updated: )
A cross-site scripting vulnerability exists in Jenkins S3 Plugin 0.10.12 and older in src/main/resources/hudson/plugins/s3/S3ArtifactsProjectAction/jobMain.jelly that allows attackers able to control file names of uploaded files to define file names containing JavaScript that would be executed in another user's browser when that user performs some UI actions.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
<=0.10.12 | ||
maven/org.jenkins-ci.plugins:s3 | <=0.10.12 | 0.11.0 |
Jenkins S3 Publisher | <=0.10.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000177 is classified as a cross-site scripting vulnerability, which can lead to significant security risks depending on exploitation.
To fix CVE-2018-1000177, upgrade the Jenkins S3 Plugin to version 0.11.0 or later.
CVE-2018-1000177 affects Jenkins S3 Plugin versions up to and including 0.10.12.
CVE-2018-1000177 is a cross-site scripting (XSS) vulnerability allowing attackers to inject malicious JavaScript.
Users of the affected versions of the Jenkins S3 Plugin are at risk if they can control file names during uploads.