First published: Mon Jul 23 2018(Updated: )
A cross-site scripting vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in the Stapler web framework's org/kohsuke/stapler/Stapler.java that allows attackers with the ability to control the existence of some URLs in Jenkins to define JavaScript that would be executed in another user's browser when that other user views HTTP 404 error pages while Stapler debug mode is enabled.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.kohsuke.stapler:stapler-parent | <1.250.1 | 1.250.1 |
maven/org.jenkins-ci.main:jenkins-core | >=2.122<2.132 | 2.132 |
maven/org.jenkins-ci.main:jenkins-core | <2.121.2 | 2.121.2 |
Jenkins | <=2.121.1 | |
Jenkins | >=2.122<=2.132 | |
Oracle Communications Cloud Native Core Automated Test Suite | =1.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1999007 is classified as a moderate severity cross-site scripting vulnerability.
To fix CVE-2018-1999007, upgrade Jenkins to version 2.132 or later, or to 2.121.2 or later.
CVE-2018-1999007 affects Jenkins versions 2.132 and earlier, as well as 2.121.1 and earlier.
CVE-2018-1999007 is a cross-site scripting (XSS) vulnerability in the Stapler web framework.
CVE-2018-1999007 can allow attackers to execute malicious JavaScript in the context of another user’s session.