First published: Mon Jul 23 2018(Updated: )
A cross-site scripting vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in BuildTimelineWidget.java, BuildTimelineWidget/control.jelly that allows attackers with Job/Configure permission to define JavaScript that would be executed in another user's browser when that other user performs some UI actions.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.main:jenkins-core | >=2.122<2.132 | 2.132 |
maven/org.jenkins-ci.main:jenkins-core | <2.121.2 | 2.121.2 |
Jenkins LTS | <=2.121.1 | |
Jenkins LTS | >=2.122<=2.132 | |
Oracle Communications Cloud Native Core Automated Test Suite | =1.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1999005 is classified as a high severity vulnerability due to its potential for cross-site scripting attacks.
To fix CVE-2018-1999005, update Jenkins to version 2.132 or later, or to 2.121.2.
CVE-2018-1999005 affects Jenkins versions 2.132 and earlier as well as version 2.121.1 and earlier.
CVE-2018-1999005 is a cross-site scripting (XSS) vulnerability that allows attackers to execute JavaScript in another user's browser.
An attacker with Job/Configure permission can exploit CVE-2018-1999005 to execute scripts in the browsers of other users.